Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2009-3560
Vulnerability from cvelistv5
Published
2009-12-04 21:00
Modified
2024-08-07 06:31
Severity ?
EPSS score ?
Summary
The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T06:31:10.684Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.165", }, { name: "SSA:2011-041-02", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026", }, { name: "FEDORA-2009-12690", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00370.html", }, { name: "38832", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/38832", }, { name: "1023278", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1023278", }, { name: "USN-890-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-890-1", }, { name: "38794", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/38794", }, { name: "[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://lists.vmware.com/pipermail/security-announce/2010/000082.html", }, { name: "ADV-2010-1107", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2010/1107", }, { name: "DSA-1953", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2009/dsa-1953", }, { name: "41701", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/41701", }, { name: "SUSE-SR:2010:011", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html", }, { name: "oval:org.mitre.oval:def:6883", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6883", }, { name: "oval:org.mitre.oval:def:12942", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12942", }, { name: "SUSE-SR:2010:013", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html", }, { name: "[expat-bugs] 20091108 [ expat-Bugs-2894085 ] expat: buffer over-read and crash in big2_toUtf8()", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://mail.python.org/pipermail/expat-bugs/2009-November/002846.html", }, { name: "SUSE-SR:2010:001", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html", }, { name: "37203", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/37203", }, { name: "USN-890-6", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-890-6", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?view=log#rev1.165", }, { name: "FEDORA-2009-12737", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00413.html", }, { name: "38231", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/38231", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { name: "SUSE-SR:2010:012", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html", }, { name: "38834", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/38834", }, { name: "39478", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/39478", }, { name: "FEDORA-2009-12716", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00394.html", }, { name: "SUSE-SR:2010:014", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", }, { name: "oval:org.mitre.oval:def:10613", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10613", }, { name: "37537", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/37537", }, { name: "43300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/43300", }, { name: "RHSA-2011:0896", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2011-0896.html", }, { name: "ADV-2010-0896", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2010/0896", }, { name: "273630", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-273630-1", }, { name: "HPSBUX02645", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=130168502603566&w=2", }, { name: "ADV-2011-0359", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2011/0359", }, { name: "MDVSA-2009:316", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:316", }, { name: "ADV-2010-0528", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2010/0528", }, { name: "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2009-12-03T00:00:00", descriptions: [ { lang: "en", value: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-06T10:09:28", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.165", }, { name: "SSA:2011-041-02", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026", }, { name: "FEDORA-2009-12690", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00370.html", }, { name: "38832", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/38832", }, { name: "1023278", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1023278", }, { name: "USN-890-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-890-1", }, { name: "38794", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/38794", }, { name: "[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://lists.vmware.com/pipermail/security-announce/2010/000082.html", }, { name: "ADV-2010-1107", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2010/1107", }, { name: "DSA-1953", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2009/dsa-1953", }, { name: "41701", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/41701", }, { name: "SUSE-SR:2010:011", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html", }, { name: "oval:org.mitre.oval:def:6883", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6883", }, { name: "oval:org.mitre.oval:def:12942", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12942", }, { name: "SUSE-SR:2010:013", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html", }, { name: "[expat-bugs] 20091108 [ expat-Bugs-2894085 ] expat: buffer over-read and crash in big2_toUtf8()", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://mail.python.org/pipermail/expat-bugs/2009-November/002846.html", }, { name: "SUSE-SR:2010:001", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html", }, { name: "37203", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/37203", }, { name: "USN-890-6", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-890-6", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?view=log#rev1.165", }, { name: "FEDORA-2009-12737", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00413.html", }, { name: "38231", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/38231", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { name: "SUSE-SR:2010:012", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html", }, { name: "38834", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/38834", }, { name: "39478", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/39478", }, { name: "FEDORA-2009-12716", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00394.html", }, { name: "SUSE-SR:2010:014", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", }, { name: "oval:org.mitre.oval:def:10613", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10613", }, { name: "37537", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/37537", }, { name: "43300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/43300", }, { name: "RHSA-2011:0896", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2011-0896.html", }, { name: "ADV-2010-0896", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2010/0896", }, { name: "273630", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-273630-1", }, { name: "HPSBUX02645", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=130168502603566&w=2", }, { name: "ADV-2011-0359", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2011/0359", }, { name: "MDVSA-2009:316", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:316", }, { name: "ADV-2010-0528", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2010/0528", }, { name: "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2009-3560", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.165", refsource: "CONFIRM", url: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.165", }, { name: "SSA:2011-041-02", refsource: "SLACKWARE", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026", }, { name: "FEDORA-2009-12690", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00370.html", }, { name: "38832", refsource: "SECUNIA", url: "http://secunia.com/advisories/38832", }, { name: "1023278", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1023278", }, { name: "USN-890-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-890-1", }, { name: "38794", refsource: "SECUNIA", url: "http://secunia.com/advisories/38794", }, { name: "[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates", refsource: "MLIST", url: "http://lists.vmware.com/pipermail/security-announce/2010/000082.html", }, { name: "ADV-2010-1107", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2010/1107", }, { name: "DSA-1953", refsource: "DEBIAN", url: "http://www.debian.org/security/2009/dsa-1953", }, { name: "41701", refsource: "SECUNIA", url: "http://secunia.com/advisories/41701", }, { name: "SUSE-SR:2010:011", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html", }, { name: "oval:org.mitre.oval:def:6883", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6883", }, { name: "oval:org.mitre.oval:def:12942", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12942", }, { name: "SUSE-SR:2010:013", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html", }, { name: "[expat-bugs] 20091108 [ expat-Bugs-2894085 ] expat: buffer over-read and crash in big2_toUtf8()", refsource: "MLIST", url: "http://mail.python.org/pipermail/expat-bugs/2009-November/002846.html", }, { name: "SUSE-SR:2010:001", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html", }, { name: "37203", refsource: "BID", url: "http://www.securityfocus.com/bid/37203", }, { name: "USN-890-6", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-890-6", }, { name: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?view=log#rev1.165", refsource: "CONFIRM", url: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?view=log#rev1.165", }, { name: "FEDORA-2009-12737", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00413.html", }, { name: "38231", refsource: "SECUNIA", url: "http://secunia.com/advisories/38231", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { name: "SUSE-SR:2010:012", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html", }, { name: "38834", refsource: "SECUNIA", url: "http://secunia.com/advisories/38834", }, { name: "39478", refsource: "SECUNIA", url: "http://secunia.com/advisories/39478", }, { name: "FEDORA-2009-12716", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00394.html", }, { name: "SUSE-SR:2010:014", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", }, { name: "oval:org.mitre.oval:def:10613", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10613", }, { name: "37537", refsource: "SECUNIA", url: "http://secunia.com/advisories/37537", }, { name: "43300", refsource: "SECUNIA", url: "http://secunia.com/advisories/43300", }, { name: "RHSA-2011:0896", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2011-0896.html", }, { name: "ADV-2010-0896", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2010/0896", }, { name: "273630", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-273630-1", }, { name: "HPSBUX02645", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=130168502603566&w=2", }, { name: "ADV-2011-0359", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2011/0359", }, { name: "MDVSA-2009:316", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:316", }, { name: "ADV-2010-0528", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2010/0528", }, { name: "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2009-3560", datePublished: "2009-12-04T21:00:00", dateReserved: "2009-10-05T00:00:00", dateUpdated: "2024-08-07T06:31:10.684Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libexpat_project:libexpat:2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7036CC4-4CF6-4D3F-B5B4-09D879A55F8E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:xmltwig:xml-twig_for_perl:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AA9A0F6-206B-4441-AFBC-1E6F00F40B9B\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.0.35\", \"versionEndExcluding\": \"2.0.64\", \"matchCriteriaId\": \"838655CB-43E7-4BDA-A80C-2314C9870717\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.2.0\", \"versionEndExcluding\": \"2.2.17\", \"matchCriteriaId\": \"91F58140-8FBA-4733-9E2B-493BC9E5B284\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.\"}, {\"lang\": \"es\", \"value\": \"La funci\\u00f3n big2_toUt8 en lib/xmltok.c en libexpat de Expat v2.0.1, como el usado en el m\\u00f3dulo XML-Twig para Perl, permite a los atacantes dependientes del contexto provocar una denegaci\\u00f3n de servicio (ca\\u00edda de aplicaci\\u00f3n) mediante un documento XML con secuencias UTF-8 malformadas que disparan un desbordamiento de lectura de b\\u00fafer, relacionado con la funci\\u00f3n doProlog en lib/xmlparse.c, siendo una vulnerabilidad diferente a CVE-2009-2625 y CVE-2009-3720.\"}]", id: "CVE-2009-3560", lastModified: "2024-11-21T01:07:40.360", metrics: "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2009-12-04T21:30:00.500", references: "[{\"url\": \"http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.165\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?view=log#rev1.165\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://lists.vmware.com/pipermail/security-announce/2010/000082.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://mail.python.org/pipermail/expat-bugs/2009-November/002846.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://marc.info/?l=bugtraq&m=130168502603566&w=2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/37537\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/38231\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/38794\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/38832\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/38834\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/39478\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/41701\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/43300\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-66-273630-1\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2009/dsa-1953\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:316\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0896.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.securityfocus.com/bid/37203\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1023278\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-890-1\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-890-6\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/0528\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/0896\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/1107\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0359\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=533174\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10613\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12942\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6883\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00370.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00394.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00413.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.165\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?view=log#rev1.165\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://lists.vmware.com/pipermail/security-announce/2010/000082.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://mail.python.org/pipermail/expat-bugs/2009-November/002846.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://marc.info/?l=bugtraq&m=130168502603566&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://secunia.com/advisories/37537\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/38231\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/38794\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/38832\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/38834\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/39478\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/41701\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://secunia.com/advisories/43300\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-66-273630-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2009/dsa-1953\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:316\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0896.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.securityfocus.com/bid/37203\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id?1023278\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-890-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-890-6\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/0528\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/0896\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2010/1107\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0359\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=533174\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10613\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12942\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6883\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\"]}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00370.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00394.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00413.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}]", sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2009-3560\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2009-12-04T21:30:00.500\",\"lastModified\":\"2024-11-21T01:07:40.360\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.\"},{\"lang\":\"es\",\"value\":\"La función big2_toUt8 en lib/xmltok.c en libexpat de Expat v2.0.1, como el usado en el módulo XML-Twig para Perl, permite a los atacantes dependientes del contexto provocar una denegación de servicio (caída de aplicación) mediante un documento XML con secuencias UTF-8 malformadas que disparan un desbordamiento de lectura de búfer, relacionado con la función doProlog en lib/xmlparse.c, siendo una vulnerabilidad diferente a CVE-2009-2625 y CVE-2009-3720.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libexpat_project:libexpat:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7036CC4-4CF6-4D3F-B5B4-09D879A55F8E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:xmltwig:xml-twig_for_perl:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AA9A0F6-206B-4441-AFBC-1E6F00F40B9B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0.35\",\"versionEndExcluding\":\"2.0.64\",\"matchCriteriaId\":\"838655CB-43E7-4BDA-A80C-2314C9870717\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.2.0\",\"versionEndExcluding\":\"2.2.17\",\"matchCriteriaId\":\"91F58140-8FBA-4733-9E2B-493BC9E5B284\"}]}]}],\"references\":[{\"url\":\"http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.165\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?view=log#rev1.165\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2010/000082.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://mail.python.org/pipermail/expat-bugs/2009-November/002846.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=bugtraq&m=130168502603566&w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/37537\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/38231\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/38794\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/38832\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/38834\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/39478\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/41701\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/43300\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-273630-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1953\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:316\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0896.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/bid/37203\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1023278\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-890-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-890-6\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0528\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0896\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/1107\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0359\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=533174\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10613\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12942\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6883\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00370.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00394.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00413.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.165\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?view=log#rev1.165\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://lists.vmware.com/pipermail/security-announce/2010/000082.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://mail.python.org/pipermail/expat-bugs/2009-November/002846.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://marc.info/?l=bugtraq&m=130168502603566&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/37537\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/38231\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/38794\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/38832\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/38834\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/39478\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/41701\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/43300\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-273630-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1953\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0896.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/bid/37203\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1023278\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-890-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-890-6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0528\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/0896\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/1107\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0359\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=533174\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10613\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12942\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6883\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00370.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00394.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00413.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]}]}}", }, }
ghsa-pcgv-8c5g-4m8p
Vulnerability from github
Published
2022-05-02 03:46
Modified
2022-05-02 03:46
Details
The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
{ affected: [], aliases: [ "CVE-2009-3560", ], database_specific: { cwe_ids: [ "CWE-119", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2009-12-04T21:30:00Z", severity: "MODERATE", }, details: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", id: "GHSA-pcgv-8c5g-4m8p", modified: "2022-05-02T03:46:23Z", published: "2022-05-02T03:46:23Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", }, { type: "WEB", url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00413.html", }, { type: "WEB", url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00394.html", }, { type: "WEB", url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00370.html", }, { type: "WEB", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6883", }, { type: "WEB", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12942", }, { type: "WEB", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10613", }, { type: "WEB", url: "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E", }, { type: "WEB", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { type: "WEB", url: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.165", }, { type: "WEB", url: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?view=log#rev1.165", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", }, { type: "WEB", url: "http://lists.vmware.com/pipermail/security-announce/2010/000082.html", }, { type: "WEB", url: "http://mail.python.org/pipermail/expat-bugs/2009-November/002846.html", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=130168502603566&w=2", }, { type: "WEB", url: "http://secunia.com/advisories/37537", }, { type: "WEB", url: "http://secunia.com/advisories/38231", }, { type: "WEB", url: "http://secunia.com/advisories/38794", }, { type: "WEB", url: "http://secunia.com/advisories/38832", }, { type: "WEB", url: "http://secunia.com/advisories/38834", }, { type: "WEB", url: "http://secunia.com/advisories/39478", }, { type: "WEB", url: "http://secunia.com/advisories/41701", }, { type: "WEB", url: "http://secunia.com/advisories/43300", }, { type: "WEB", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026", }, { type: "WEB", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-273630-1", }, { type: "WEB", url: "http://www.debian.org/security/2009/dsa-1953", }, { type: "WEB", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:316", }, { type: "WEB", url: "http://www.redhat.com/support/errata/RHSA-2011-0896.html", }, { type: "WEB", url: "http://www.securityfocus.com/bid/37203", }, { type: "WEB", url: "http://www.securitytracker.com/id?1023278", }, { type: "WEB", url: "http://www.ubuntu.com/usn/USN-890-1", }, { type: "WEB", url: "http://www.ubuntu.com/usn/USN-890-6", }, { type: "WEB", url: "http://www.vupen.com/english/advisories/2010/0528", }, { type: "WEB", url: "http://www.vupen.com/english/advisories/2010/0896", }, { type: "WEB", url: "http://www.vupen.com/english/advisories/2010/1107", }, { type: "WEB", url: "http://www.vupen.com/english/advisories/2011/0359", }, ], schema_version: "1.4.0", severity: [], }
opensuse-su-2024:11586-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
apr-util-devel-1.6.1-8.1 on GA media
Notes
Title of the patch
apr-util-devel-1.6.1-8.1 on GA media
Description of the patch
These are all security issues fixed in the apr-util-devel-1.6.1-8.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11586
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "apr-util-devel-1.6.1-8.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the apr-util-devel-1.6.1-8.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-11586", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11586-1.json", }, { category: "self", summary: "SUSE CVE CVE-2009-0023 page", url: "https://www.suse.com/security/cve/CVE-2009-0023/", }, { category: "self", summary: "SUSE CVE CVE-2009-2412 page", url: "https://www.suse.com/security/cve/CVE-2009-2412/", }, { category: "self", summary: "SUSE CVE CVE-2009-3560 page", url: "https://www.suse.com/security/cve/CVE-2009-3560/", }, { category: "self", summary: "SUSE CVE CVE-2010-1623 page", url: "https://www.suse.com/security/cve/CVE-2010-1623/", }, ], title: "apr-util-devel-1.6.1-8.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:11586-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "apr-util-devel-1.6.1-8.1.aarch64", product: { name: "apr-util-devel-1.6.1-8.1.aarch64", product_id: "apr-util-devel-1.6.1-8.1.aarch64", }, }, { category: "product_version", name: "libapr-util1-0-1.6.1-8.1.aarch64", product: { name: "libapr-util1-0-1.6.1-8.1.aarch64", product_id: "libapr-util1-0-1.6.1-8.1.aarch64", }, }, { category: "product_version", name: "libapr-util1-0-dbd-mysql-1.6.1-8.1.aarch64", product: { name: "libapr-util1-0-dbd-mysql-1.6.1-8.1.aarch64", product_id: "libapr-util1-0-dbd-mysql-1.6.1-8.1.aarch64", }, }, { category: "product_version", name: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.aarch64", product: { name: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.aarch64", product_id: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.aarch64", }, }, { category: "product_version", name: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.aarch64", product: { name: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.aarch64", product_id: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "apr-util-devel-1.6.1-8.1.ppc64le", product: { name: "apr-util-devel-1.6.1-8.1.ppc64le", product_id: "apr-util-devel-1.6.1-8.1.ppc64le", }, }, { category: "product_version", name: "libapr-util1-0-1.6.1-8.1.ppc64le", product: { name: "libapr-util1-0-1.6.1-8.1.ppc64le", product_id: "libapr-util1-0-1.6.1-8.1.ppc64le", }, }, { category: "product_version", name: "libapr-util1-0-dbd-mysql-1.6.1-8.1.ppc64le", product: { name: "libapr-util1-0-dbd-mysql-1.6.1-8.1.ppc64le", product_id: "libapr-util1-0-dbd-mysql-1.6.1-8.1.ppc64le", }, }, { category: "product_version", name: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.ppc64le", product: { name: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.ppc64le", product_id: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.ppc64le", }, }, { category: "product_version", name: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.ppc64le", product: { name: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.ppc64le", product_id: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "apr-util-devel-1.6.1-8.1.s390x", product: { name: "apr-util-devel-1.6.1-8.1.s390x", product_id: "apr-util-devel-1.6.1-8.1.s390x", }, }, { category: "product_version", name: "libapr-util1-0-1.6.1-8.1.s390x", product: { name: "libapr-util1-0-1.6.1-8.1.s390x", product_id: "libapr-util1-0-1.6.1-8.1.s390x", }, }, { category: "product_version", name: "libapr-util1-0-dbd-mysql-1.6.1-8.1.s390x", product: { name: "libapr-util1-0-dbd-mysql-1.6.1-8.1.s390x", product_id: "libapr-util1-0-dbd-mysql-1.6.1-8.1.s390x", }, }, { category: "product_version", name: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.s390x", product: { name: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.s390x", product_id: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.s390x", }, }, { category: "product_version", name: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.s390x", product: { name: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.s390x", product_id: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "apr-util-devel-1.6.1-8.1.x86_64", product: { name: "apr-util-devel-1.6.1-8.1.x86_64", product_id: "apr-util-devel-1.6.1-8.1.x86_64", }, }, { category: "product_version", name: "libapr-util1-0-1.6.1-8.1.x86_64", product: { name: "libapr-util1-0-1.6.1-8.1.x86_64", product_id: "libapr-util1-0-1.6.1-8.1.x86_64", }, }, { category: "product_version", name: "libapr-util1-0-dbd-mysql-1.6.1-8.1.x86_64", product: { name: "libapr-util1-0-dbd-mysql-1.6.1-8.1.x86_64", product_id: "libapr-util1-0-dbd-mysql-1.6.1-8.1.x86_64", }, }, { category: "product_version", name: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.x86_64", product: { name: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.x86_64", product_id: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.x86_64", }, }, { category: "product_version", name: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.x86_64", product: { name: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.x86_64", product_id: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "apr-util-devel-1.6.1-8.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.aarch64", }, product_reference: "apr-util-devel-1.6.1-8.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apr-util-devel-1.6.1-8.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.ppc64le", }, product_reference: "apr-util-devel-1.6.1-8.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apr-util-devel-1.6.1-8.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.s390x", }, product_reference: "apr-util-devel-1.6.1-8.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apr-util-devel-1.6.1-8.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.x86_64", }, product_reference: "apr-util-devel-1.6.1-8.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-0-1.6.1-8.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.aarch64", }, product_reference: "libapr-util1-0-1.6.1-8.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-0-1.6.1-8.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.ppc64le", }, product_reference: "libapr-util1-0-1.6.1-8.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-0-1.6.1-8.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.s390x", }, product_reference: "libapr-util1-0-1.6.1-8.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-0-1.6.1-8.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.x86_64", }, product_reference: "libapr-util1-0-1.6.1-8.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-0-dbd-mysql-1.6.1-8.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.aarch64", }, product_reference: "libapr-util1-0-dbd-mysql-1.6.1-8.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-0-dbd-mysql-1.6.1-8.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.ppc64le", }, product_reference: "libapr-util1-0-dbd-mysql-1.6.1-8.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-0-dbd-mysql-1.6.1-8.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.s390x", }, product_reference: "libapr-util1-0-dbd-mysql-1.6.1-8.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-0-dbd-mysql-1.6.1-8.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.x86_64", }, product_reference: "libapr-util1-0-dbd-mysql-1.6.1-8.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.aarch64", }, product_reference: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.ppc64le", }, product_reference: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.s390x", }, product_reference: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.x86_64", }, product_reference: "libapr-util1-0-dbd-pgsql-1.6.1-8.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.aarch64", }, product_reference: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.ppc64le", }, product_reference: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.s390x", }, product_reference: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.x86_64", }, product_reference: "libapr-util1-0-dbd-sqlite3-1.6.1-8.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2009-0023", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-0023", }, ], notes: [ { category: "general", text: "The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.s390x", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-0023", url: "https://www.suse.com/security/cve/CVE-2009-0023", }, { category: "external", summary: "SUSE Bug 510301 for CVE-2009-0023", url: "https://bugzilla.suse.com/510301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.s390x", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-0023", }, { cve: "CVE-2009-2412", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-2412", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.s390x", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-2412", url: "https://www.suse.com/security/cve/CVE-2009-2412", }, { category: "external", summary: "SUSE Bug 528714 for CVE-2009-2412", url: "https://bugzilla.suse.com/528714", }, { category: "external", summary: "SUSE Bug 529591 for CVE-2009-2412", url: "https://bugzilla.suse.com/529591", }, { category: "external", summary: "SUSE Bug 802057 for CVE-2009-2412", url: "https://bugzilla.suse.com/802057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.s390x", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2009-2412", }, { cve: "CVE-2009-3560", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-3560", }, ], notes: [ { category: "general", text: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.s390x", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-3560", url: "https://www.suse.com/security/cve/CVE-2009-3560", }, { category: "external", summary: "SUSE Bug 550666 for CVE-2009-3560", url: "https://bugzilla.suse.com/550666", }, { category: "external", summary: "SUSE Bug 558892 for CVE-2009-3560", url: "https://bugzilla.suse.com/558892", }, { category: "external", summary: "SUSE Bug 561561 for CVE-2009-3560", url: "https://bugzilla.suse.com/561561", }, { category: "external", summary: "SUSE Bug 581162 for CVE-2009-3560", url: "https://bugzilla.suse.com/581162", }, { category: "external", summary: "SUSE Bug 581765 for CVE-2009-3560", url: "https://bugzilla.suse.com/581765", }, { category: "external", summary: "SUSE Bug 611931 for CVE-2009-3560", url: "https://bugzilla.suse.com/611931", }, { category: "external", summary: "SUSE Bug 694595 for CVE-2009-3560", url: "https://bugzilla.suse.com/694595", }, { category: "external", summary: "SUSE Bug 725950 for CVE-2009-3560", url: "https://bugzilla.suse.com/725950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.s390x", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-3560", }, { cve: "CVE-2010-1623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-1623", }, ], notes: [ { category: "general", text: "Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.s390x", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-1623", url: "https://www.suse.com/security/cve/CVE-2010-1623", }, { category: "external", summary: "SUSE Bug 650435 for CVE-2010-1623", url: "https://bugzilla.suse.com/650435", }, { category: "external", summary: "SUSE Bug 693778 for CVE-2010-1623", url: "https://bugzilla.suse.com/693778", }, { category: "external", summary: "SUSE Bug 725950 for CVE-2010-1623", url: "https://bugzilla.suse.com/725950", }, { category: "external", summary: "SUSE Bug 997229 for CVE-2010-1623", url: "https://bugzilla.suse.com/997229", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.s390x", "openSUSE Tumbleweed:apr-util-devel-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-mysql-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-pgsql-1.6.1-8.1.x86_64", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.aarch64", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.ppc64le", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.s390x", "openSUSE Tumbleweed:libapr-util1-0-dbd-sqlite3-1.6.1-8.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2010-1623", }, ], }
opensuse-su-2024:10077-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
expat-2.2.0-3.1 on GA media
Notes
Title of the patch
expat-2.2.0-3.1 on GA media
Description of the patch
These are all security issues fixed in the expat-2.2.0-3.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10077
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "expat-2.2.0-3.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the expat-2.2.0-3.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10077", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10077-1.json", }, { category: "self", summary: "SUSE CVE CVE-2009-2625 page", url: "https://www.suse.com/security/cve/CVE-2009-2625/", }, { category: "self", summary: "SUSE CVE CVE-2009-3560 page", url: "https://www.suse.com/security/cve/CVE-2009-3560/", }, { category: "self", summary: "SUSE CVE CVE-2009-3720 page", url: "https://www.suse.com/security/cve/CVE-2009-3720/", }, { category: "self", summary: "SUSE CVE CVE-2012-0876 page", url: "https://www.suse.com/security/cve/CVE-2012-0876/", }, { category: "self", summary: "SUSE CVE CVE-2012-1147 page", url: "https://www.suse.com/security/cve/CVE-2012-1147/", }, { category: "self", summary: "SUSE CVE CVE-2012-1148 page", url: "https://www.suse.com/security/cve/CVE-2012-1148/", }, { category: "self", summary: "SUSE CVE CVE-2012-6702 page", url: "https://www.suse.com/security/cve/CVE-2012-6702/", }, { category: "self", summary: "SUSE CVE CVE-2015-1283 page", url: "https://www.suse.com/security/cve/CVE-2015-1283/", }, { category: "self", summary: "SUSE CVE CVE-2016-0718 page", url: "https://www.suse.com/security/cve/CVE-2016-0718/", }, { category: "self", summary: "SUSE CVE CVE-2016-4472 page", url: "https://www.suse.com/security/cve/CVE-2016-4472/", }, { category: "self", summary: "SUSE CVE CVE-2016-5300 page", url: "https://www.suse.com/security/cve/CVE-2016-5300/", }, ], title: "expat-2.2.0-3.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10077-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "expat-2.2.0-3.1.aarch64", product: { name: "expat-2.2.0-3.1.aarch64", product_id: "expat-2.2.0-3.1.aarch64", }, }, { category: "product_version", name: "libexpat-devel-2.2.0-3.1.aarch64", product: { name: "libexpat-devel-2.2.0-3.1.aarch64", product_id: "libexpat-devel-2.2.0-3.1.aarch64", }, }, { category: "product_version", name: "libexpat-devel-32bit-2.2.0-3.1.aarch64", product: { name: "libexpat-devel-32bit-2.2.0-3.1.aarch64", product_id: "libexpat-devel-32bit-2.2.0-3.1.aarch64", }, }, { category: "product_version", name: "libexpat1-2.2.0-3.1.aarch64", product: { name: "libexpat1-2.2.0-3.1.aarch64", product_id: "libexpat1-2.2.0-3.1.aarch64", }, }, { category: "product_version", name: "libexpat1-32bit-2.2.0-3.1.aarch64", product: { name: "libexpat1-32bit-2.2.0-3.1.aarch64", product_id: "libexpat1-32bit-2.2.0-3.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "expat-2.2.0-3.1.ppc64le", product: { name: "expat-2.2.0-3.1.ppc64le", product_id: "expat-2.2.0-3.1.ppc64le", }, }, { category: "product_version", name: "libexpat-devel-2.2.0-3.1.ppc64le", product: { name: "libexpat-devel-2.2.0-3.1.ppc64le", product_id: "libexpat-devel-2.2.0-3.1.ppc64le", }, }, { category: "product_version", name: "libexpat-devel-32bit-2.2.0-3.1.ppc64le", product: { name: "libexpat-devel-32bit-2.2.0-3.1.ppc64le", product_id: "libexpat-devel-32bit-2.2.0-3.1.ppc64le", }, }, { category: "product_version", name: "libexpat1-2.2.0-3.1.ppc64le", product: { name: "libexpat1-2.2.0-3.1.ppc64le", product_id: "libexpat1-2.2.0-3.1.ppc64le", }, }, { category: "product_version", name: "libexpat1-32bit-2.2.0-3.1.ppc64le", product: { name: "libexpat1-32bit-2.2.0-3.1.ppc64le", product_id: "libexpat1-32bit-2.2.0-3.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "expat-2.2.0-3.1.s390x", product: { name: "expat-2.2.0-3.1.s390x", product_id: "expat-2.2.0-3.1.s390x", }, }, { category: "product_version", name: "libexpat-devel-2.2.0-3.1.s390x", product: { name: "libexpat-devel-2.2.0-3.1.s390x", product_id: "libexpat-devel-2.2.0-3.1.s390x", }, }, { category: "product_version", name: "libexpat-devel-32bit-2.2.0-3.1.s390x", product: { name: "libexpat-devel-32bit-2.2.0-3.1.s390x", product_id: "libexpat-devel-32bit-2.2.0-3.1.s390x", }, }, { category: "product_version", name: "libexpat1-2.2.0-3.1.s390x", product: { name: "libexpat1-2.2.0-3.1.s390x", product_id: "libexpat1-2.2.0-3.1.s390x", }, }, { category: "product_version", name: "libexpat1-32bit-2.2.0-3.1.s390x", product: { name: "libexpat1-32bit-2.2.0-3.1.s390x", product_id: "libexpat1-32bit-2.2.0-3.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "expat-2.2.0-3.1.x86_64", product: { name: "expat-2.2.0-3.1.x86_64", product_id: "expat-2.2.0-3.1.x86_64", }, }, { category: "product_version", name: "libexpat-devel-2.2.0-3.1.x86_64", product: { name: "libexpat-devel-2.2.0-3.1.x86_64", product_id: "libexpat-devel-2.2.0-3.1.x86_64", }, }, { category: "product_version", name: "libexpat-devel-32bit-2.2.0-3.1.x86_64", product: { name: "libexpat-devel-32bit-2.2.0-3.1.x86_64", product_id: "libexpat-devel-32bit-2.2.0-3.1.x86_64", }, }, { category: "product_version", name: "libexpat1-2.2.0-3.1.x86_64", product: { name: "libexpat1-2.2.0-3.1.x86_64", product_id: "libexpat1-2.2.0-3.1.x86_64", }, }, { category: "product_version", name: "libexpat1-32bit-2.2.0-3.1.x86_64", product: { name: "libexpat1-32bit-2.2.0-3.1.x86_64", product_id: "libexpat1-32bit-2.2.0-3.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "expat-2.2.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", }, product_reference: "expat-2.2.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "expat-2.2.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", }, product_reference: "expat-2.2.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "expat-2.2.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", }, product_reference: "expat-2.2.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "expat-2.2.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", }, product_reference: "expat-2.2.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libexpat-devel-2.2.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", }, product_reference: "libexpat-devel-2.2.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libexpat-devel-2.2.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", }, product_reference: "libexpat-devel-2.2.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libexpat-devel-2.2.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", }, product_reference: "libexpat-devel-2.2.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libexpat-devel-2.2.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", }, product_reference: "libexpat-devel-2.2.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libexpat-devel-32bit-2.2.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", }, product_reference: "libexpat-devel-32bit-2.2.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libexpat-devel-32bit-2.2.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", }, product_reference: "libexpat-devel-32bit-2.2.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libexpat-devel-32bit-2.2.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", }, product_reference: "libexpat-devel-32bit-2.2.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libexpat-devel-32bit-2.2.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", }, product_reference: "libexpat-devel-32bit-2.2.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libexpat1-2.2.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", }, product_reference: "libexpat1-2.2.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libexpat1-2.2.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", }, product_reference: "libexpat1-2.2.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libexpat1-2.2.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", }, product_reference: "libexpat1-2.2.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libexpat1-2.2.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", }, product_reference: "libexpat1-2.2.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libexpat1-32bit-2.2.0-3.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", }, product_reference: "libexpat1-32bit-2.2.0-3.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libexpat1-32bit-2.2.0-3.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", }, product_reference: "libexpat1-32bit-2.2.0-3.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libexpat1-32bit-2.2.0-3.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", }, product_reference: "libexpat1-32bit-2.2.0-3.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libexpat1-32bit-2.2.0-3.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", }, product_reference: "libexpat1-32bit-2.2.0-3.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2009-2625", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-2625", }, ], notes: [ { category: "general", text: "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-2625", url: "https://www.suse.com/security/cve/CVE-2009-2625", }, { category: "external", summary: "SUSE Bug 525562 for CVE-2009-2625", url: "https://bugzilla.suse.com/525562", }, { category: "external", summary: "SUSE Bug 530717 for CVE-2009-2625", url: "https://bugzilla.suse.com/530717", }, { category: "external", summary: "SUSE Bug 534025 for CVE-2009-2625", url: "https://bugzilla.suse.com/534025", }, { category: "external", summary: "SUSE Bug 534721 for CVE-2009-2625", url: "https://bugzilla.suse.com/534721", }, { category: "external", summary: "SUSE Bug 537969 for CVE-2009-2625", url: "https://bugzilla.suse.com/537969", }, { category: "external", summary: "SUSE Bug 540945 for CVE-2009-2625", url: "https://bugzilla.suse.com/540945", }, { category: "external", summary: "SUSE Bug 548655 for CVE-2009-2625", url: "https://bugzilla.suse.com/548655", }, { category: "external", summary: "SUSE Bug 550664 for CVE-2009-2625", url: "https://bugzilla.suse.com/550664", }, { category: "external", summary: "SUSE Bug 553220 for CVE-2009-2625", url: "https://bugzilla.suse.com/553220", }, { category: "external", summary: "SUSE Bug 558892 for CVE-2009-2625", url: "https://bugzilla.suse.com/558892", }, { category: "external", summary: "SUSE Bug 581162 for CVE-2009-2625", url: "https://bugzilla.suse.com/581162", }, { category: "external", summary: "SUSE Bug 581765 for CVE-2009-2625", url: "https://bugzilla.suse.com/581765", }, { category: "external", summary: "SUSE Bug 610080 for CVE-2009-2625", url: "https://bugzilla.suse.com/610080", }, { category: "external", summary: "SUSE Bug 611931 for CVE-2009-2625", url: "https://bugzilla.suse.com/611931", }, { category: "external", summary: "SUSE Bug 611932 for CVE-2009-2625", url: "https://bugzilla.suse.com/611932", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2009-2625", }, { cve: "CVE-2009-3560", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-3560", }, ], notes: [ { category: "general", text: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-3560", url: "https://www.suse.com/security/cve/CVE-2009-3560", }, { category: "external", summary: "SUSE Bug 550666 for CVE-2009-3560", url: "https://bugzilla.suse.com/550666", }, { category: "external", summary: "SUSE Bug 558892 for CVE-2009-3560", url: "https://bugzilla.suse.com/558892", }, { category: "external", summary: "SUSE Bug 561561 for CVE-2009-3560", url: "https://bugzilla.suse.com/561561", }, { category: "external", summary: "SUSE Bug 581162 for CVE-2009-3560", url: "https://bugzilla.suse.com/581162", }, { category: "external", summary: "SUSE Bug 581765 for CVE-2009-3560", url: "https://bugzilla.suse.com/581765", }, { category: "external", summary: "SUSE Bug 611931 for CVE-2009-3560", url: "https://bugzilla.suse.com/611931", }, { category: "external", summary: "SUSE Bug 694595 for CVE-2009-3560", url: "https://bugzilla.suse.com/694595", }, { category: "external", summary: "SUSE Bug 725950 for CVE-2009-3560", url: "https://bugzilla.suse.com/725950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-3560", }, { cve: "CVE-2009-3720", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-3720", }, ], notes: [ { category: "general", text: "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-3720", url: "https://www.suse.com/security/cve/CVE-2009-3720", }, { category: "external", summary: "SUSE Bug 534721 for CVE-2009-3720", url: "https://bugzilla.suse.com/534721", }, { category: "external", summary: "SUSE Bug 550664 for CVE-2009-3720", url: "https://bugzilla.suse.com/550664", }, { category: "external", summary: "SUSE Bug 550666 for CVE-2009-3720", url: "https://bugzilla.suse.com/550666", }, { category: "external", summary: "SUSE Bug 558892 for CVE-2009-3720", url: "https://bugzilla.suse.com/558892", }, { category: "external", summary: "SUSE Bug 561561 for CVE-2009-3720", url: "https://bugzilla.suse.com/561561", }, { category: "external", summary: "SUSE Bug 581162 for CVE-2009-3720", url: "https://bugzilla.suse.com/581162", }, { category: "external", summary: "SUSE Bug 581765 for CVE-2009-3720", url: "https://bugzilla.suse.com/581765", }, { category: "external", summary: "SUSE Bug 611931 for CVE-2009-3720", url: "https://bugzilla.suse.com/611931", }, { category: "external", summary: "SUSE Bug 725950 for CVE-2009-3720", url: "https://bugzilla.suse.com/725950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-3720", }, { cve: "CVE-2012-0876", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-0876", }, ], notes: [ { category: "general", text: "The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-0876", url: "https://www.suse.com/security/cve/CVE-2012-0876", }, { category: "external", summary: "SUSE Bug 750914 for CVE-2012-0876", url: "https://bugzilla.suse.com/750914", }, { category: "external", summary: "SUSE Bug 751464 for CVE-2012-0876", url: "https://bugzilla.suse.com/751464", }, { category: "external", summary: "SUSE Bug 751465 for CVE-2012-0876", url: "https://bugzilla.suse.com/751465", }, { category: "external", summary: "SUSE Bug 983215 for CVE-2012-0876", url: "https://bugzilla.suse.com/983215", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2012-0876", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-0876", }, { cve: "CVE-2012-1147", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-1147", }, ], notes: [ { category: "general", text: "readfilemap.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (file descriptor consumption) via a large number of crafted XML files.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-1147", url: "https://www.suse.com/security/cve/CVE-2012-1147", }, { category: "external", summary: "SUSE Bug 750914 for CVE-2012-1147", url: "https://bugzilla.suse.com/750914", }, { category: "external", summary: "SUSE Bug 751464 for CVE-2012-1147", url: "https://bugzilla.suse.com/751464", }, { category: "external", summary: "SUSE Bug 751465 for CVE-2012-1147", url: "https://bugzilla.suse.com/751465", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-1147", }, { cve: "CVE-2012-1148", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-1148", }, ], notes: [ { category: "general", text: "Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-1148", url: "https://www.suse.com/security/cve/CVE-2012-1148", }, { category: "external", summary: "SUSE Bug 750914 for CVE-2012-1148", url: "https://bugzilla.suse.com/750914", }, { category: "external", summary: "SUSE Bug 751464 for CVE-2012-1148", url: "https://bugzilla.suse.com/751464", }, { category: "external", summary: "SUSE Bug 751465 for CVE-2012-1148", url: "https://bugzilla.suse.com/751465", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-1148", }, { cve: "CVE-2012-6702", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-6702", }, ], notes: [ { category: "general", text: "Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-6702", url: "https://www.suse.com/security/cve/CVE-2012-6702", }, { category: "external", summary: "SUSE Bug 983215 for CVE-2012-6702", url: "https://bugzilla.suse.com/983215", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2012-6702", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-6702", }, { cve: "CVE-2015-1283", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-1283", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-1283", url: "https://www.suse.com/security/cve/CVE-2015-1283", }, { category: "external", summary: "SUSE Bug 1034050 for CVE-2015-1283", url: "https://bugzilla.suse.com/1034050", }, { category: "external", summary: "SUSE Bug 939077 for CVE-2015-1283", url: "https://bugzilla.suse.com/939077", }, { category: "external", summary: "SUSE Bug 979441 for CVE-2015-1283", url: "https://bugzilla.suse.com/979441", }, { category: "external", summary: "SUSE Bug 980391 for CVE-2015-1283", url: "https://bugzilla.suse.com/980391", }, { category: "external", summary: "SUSE Bug 983985 for CVE-2015-1283", url: "https://bugzilla.suse.com/983985", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2015-1283", }, { cve: "CVE-2016-0718", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0718", }, ], notes: [ { category: "general", text: "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0718", url: "https://www.suse.com/security/cve/CVE-2016-0718", }, { category: "external", summary: "SUSE Bug 979441 for CVE-2016-0718", url: "https://bugzilla.suse.com/979441", }, { category: "external", summary: "SUSE Bug 991809 for CVE-2016-0718", url: "https://bugzilla.suse.com/991809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-0718", }, { cve: "CVE-2016-4472", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4472", }, ], notes: [ { category: "general", text: "The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4472", url: "https://www.suse.com/security/cve/CVE-2016-4472", }, { category: "external", summary: "SUSE Bug 1034050 for CVE-2016-4472", url: "https://bugzilla.suse.com/1034050", }, { category: "external", summary: "SUSE Bug 939077 for CVE-2016-4472", url: "https://bugzilla.suse.com/939077", }, { category: "external", summary: "SUSE Bug 980391 for CVE-2016-4472", url: "https://bugzilla.suse.com/980391", }, { category: "external", summary: "SUSE Bug 983985 for CVE-2016-4472", url: "https://bugzilla.suse.com/983985", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2016-4472", }, { cve: "CVE-2016-5300", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5300", }, ], notes: [ { category: "general", text: "The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5300", url: "https://www.suse.com/security/cve/CVE-2016-5300", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2016-5300", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:expat-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:expat-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:expat-2.2.0-3.1.s390x", "openSUSE Tumbleweed:expat-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat-devel-32bit-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-2.2.0-3.1.x86_64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.aarch64", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.ppc64le", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.s390x", "openSUSE Tumbleweed:libexpat1-32bit-2.2.0-3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2016-5300", }, ], }
opensuse-su-2024:10568-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
libapr-util1-1.5.4-4.4 on GA media
Notes
Title of the patch
libapr-util1-1.5.4-4.4 on GA media
Description of the patch
These are all security issues fixed in the libapr-util1-1.5.4-4.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10568
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "libapr-util1-1.5.4-4.4 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the libapr-util1-1.5.4-4.4 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10568", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10568-1.json", }, { category: "self", summary: "SUSE CVE CVE-2009-0023 page", url: "https://www.suse.com/security/cve/CVE-2009-0023/", }, { category: "self", summary: "SUSE CVE CVE-2009-2412 page", url: "https://www.suse.com/security/cve/CVE-2009-2412/", }, { category: "self", summary: "SUSE CVE CVE-2009-3560 page", url: "https://www.suse.com/security/cve/CVE-2009-3560/", }, { category: "self", summary: "SUSE CVE CVE-2009-3720 page", url: "https://www.suse.com/security/cve/CVE-2009-3720/", }, { category: "self", summary: "SUSE CVE CVE-2010-1623 page", url: "https://www.suse.com/security/cve/CVE-2010-1623/", }, ], title: "libapr-util1-1.5.4-4.4 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10568-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libapr-util1-1.5.4-4.4.aarch64", product: { name: "libapr-util1-1.5.4-4.4.aarch64", product_id: "libapr-util1-1.5.4-4.4.aarch64", }, }, { category: "product_version", name: "libapr-util1-dbd-mysql-1.5.4-4.4.aarch64", product: { name: "libapr-util1-dbd-mysql-1.5.4-4.4.aarch64", product_id: "libapr-util1-dbd-mysql-1.5.4-4.4.aarch64", }, }, { category: "product_version", name: "libapr-util1-dbd-pgsql-1.5.4-4.4.aarch64", product: { name: "libapr-util1-dbd-pgsql-1.5.4-4.4.aarch64", product_id: "libapr-util1-dbd-pgsql-1.5.4-4.4.aarch64", }, }, { category: "product_version", name: "libapr-util1-dbd-sqlite3-1.5.4-4.4.aarch64", product: { name: "libapr-util1-dbd-sqlite3-1.5.4-4.4.aarch64", product_id: "libapr-util1-dbd-sqlite3-1.5.4-4.4.aarch64", }, }, { category: "product_version", name: "libapr-util1-devel-1.5.4-4.4.aarch64", product: { name: "libapr-util1-devel-1.5.4-4.4.aarch64", product_id: "libapr-util1-devel-1.5.4-4.4.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libapr-util1-1.5.4-4.4.ppc64le", product: { name: "libapr-util1-1.5.4-4.4.ppc64le", product_id: "libapr-util1-1.5.4-4.4.ppc64le", }, }, { category: "product_version", name: "libapr-util1-dbd-mysql-1.5.4-4.4.ppc64le", product: { name: "libapr-util1-dbd-mysql-1.5.4-4.4.ppc64le", product_id: "libapr-util1-dbd-mysql-1.5.4-4.4.ppc64le", }, }, { category: "product_version", name: "libapr-util1-dbd-pgsql-1.5.4-4.4.ppc64le", product: { name: "libapr-util1-dbd-pgsql-1.5.4-4.4.ppc64le", product_id: "libapr-util1-dbd-pgsql-1.5.4-4.4.ppc64le", }, }, { category: "product_version", name: "libapr-util1-dbd-sqlite3-1.5.4-4.4.ppc64le", product: { name: "libapr-util1-dbd-sqlite3-1.5.4-4.4.ppc64le", product_id: "libapr-util1-dbd-sqlite3-1.5.4-4.4.ppc64le", }, }, { category: "product_version", name: "libapr-util1-devel-1.5.4-4.4.ppc64le", product: { name: "libapr-util1-devel-1.5.4-4.4.ppc64le", product_id: "libapr-util1-devel-1.5.4-4.4.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libapr-util1-1.5.4-4.4.s390x", product: { name: "libapr-util1-1.5.4-4.4.s390x", product_id: "libapr-util1-1.5.4-4.4.s390x", }, }, { category: "product_version", name: "libapr-util1-dbd-mysql-1.5.4-4.4.s390x", product: { name: "libapr-util1-dbd-mysql-1.5.4-4.4.s390x", product_id: "libapr-util1-dbd-mysql-1.5.4-4.4.s390x", }, }, { category: "product_version", name: "libapr-util1-dbd-pgsql-1.5.4-4.4.s390x", product: { name: "libapr-util1-dbd-pgsql-1.5.4-4.4.s390x", product_id: "libapr-util1-dbd-pgsql-1.5.4-4.4.s390x", }, }, { category: "product_version", name: "libapr-util1-dbd-sqlite3-1.5.4-4.4.s390x", product: { name: "libapr-util1-dbd-sqlite3-1.5.4-4.4.s390x", product_id: "libapr-util1-dbd-sqlite3-1.5.4-4.4.s390x", }, }, { category: "product_version", name: "libapr-util1-devel-1.5.4-4.4.s390x", product: { name: "libapr-util1-devel-1.5.4-4.4.s390x", product_id: "libapr-util1-devel-1.5.4-4.4.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libapr-util1-1.5.4-4.4.x86_64", product: { name: "libapr-util1-1.5.4-4.4.x86_64", product_id: "libapr-util1-1.5.4-4.4.x86_64", }, }, { category: "product_version", name: "libapr-util1-dbd-mysql-1.5.4-4.4.x86_64", product: { name: "libapr-util1-dbd-mysql-1.5.4-4.4.x86_64", product_id: "libapr-util1-dbd-mysql-1.5.4-4.4.x86_64", }, }, { category: "product_version", name: "libapr-util1-dbd-pgsql-1.5.4-4.4.x86_64", product: { name: "libapr-util1-dbd-pgsql-1.5.4-4.4.x86_64", product_id: "libapr-util1-dbd-pgsql-1.5.4-4.4.x86_64", }, }, { category: "product_version", name: "libapr-util1-dbd-sqlite3-1.5.4-4.4.x86_64", product: { name: "libapr-util1-dbd-sqlite3-1.5.4-4.4.x86_64", product_id: "libapr-util1-dbd-sqlite3-1.5.4-4.4.x86_64", }, }, { category: "product_version", name: "libapr-util1-devel-1.5.4-4.4.x86_64", product: { name: "libapr-util1-devel-1.5.4-4.4.x86_64", product_id: "libapr-util1-devel-1.5.4-4.4.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libapr-util1-1.5.4-4.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.aarch64", }, product_reference: "libapr-util1-1.5.4-4.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-1.5.4-4.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.ppc64le", }, product_reference: "libapr-util1-1.5.4-4.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-1.5.4-4.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.s390x", }, product_reference: "libapr-util1-1.5.4-4.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-1.5.4-4.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.x86_64", }, product_reference: "libapr-util1-1.5.4-4.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-dbd-mysql-1.5.4-4.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.aarch64", }, product_reference: "libapr-util1-dbd-mysql-1.5.4-4.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-dbd-mysql-1.5.4-4.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.ppc64le", }, product_reference: "libapr-util1-dbd-mysql-1.5.4-4.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-dbd-mysql-1.5.4-4.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.s390x", }, product_reference: "libapr-util1-dbd-mysql-1.5.4-4.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-dbd-mysql-1.5.4-4.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.x86_64", }, product_reference: "libapr-util1-dbd-mysql-1.5.4-4.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-dbd-pgsql-1.5.4-4.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.aarch64", }, product_reference: "libapr-util1-dbd-pgsql-1.5.4-4.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-dbd-pgsql-1.5.4-4.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.ppc64le", }, product_reference: "libapr-util1-dbd-pgsql-1.5.4-4.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-dbd-pgsql-1.5.4-4.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.s390x", }, product_reference: "libapr-util1-dbd-pgsql-1.5.4-4.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-dbd-pgsql-1.5.4-4.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.x86_64", }, product_reference: "libapr-util1-dbd-pgsql-1.5.4-4.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-dbd-sqlite3-1.5.4-4.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.aarch64", }, product_reference: "libapr-util1-dbd-sqlite3-1.5.4-4.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-dbd-sqlite3-1.5.4-4.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.ppc64le", }, product_reference: "libapr-util1-dbd-sqlite3-1.5.4-4.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-dbd-sqlite3-1.5.4-4.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.s390x", }, product_reference: "libapr-util1-dbd-sqlite3-1.5.4-4.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-dbd-sqlite3-1.5.4-4.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.x86_64", }, product_reference: "libapr-util1-dbd-sqlite3-1.5.4-4.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-devel-1.5.4-4.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.aarch64", }, product_reference: "libapr-util1-devel-1.5.4-4.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-devel-1.5.4-4.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.ppc64le", }, product_reference: "libapr-util1-devel-1.5.4-4.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-devel-1.5.4-4.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.s390x", }, product_reference: "libapr-util1-devel-1.5.4-4.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libapr-util1-devel-1.5.4-4.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.x86_64", }, product_reference: "libapr-util1-devel-1.5.4-4.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2009-0023", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-0023", }, ], notes: [ { category: "general", text: "The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-0023", url: "https://www.suse.com/security/cve/CVE-2009-0023", }, { category: "external", summary: "SUSE Bug 510301 for CVE-2009-0023", url: "https://bugzilla.suse.com/510301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-0023", }, { cve: "CVE-2009-2412", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-2412", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-2412", url: "https://www.suse.com/security/cve/CVE-2009-2412", }, { category: "external", summary: "SUSE Bug 528714 for CVE-2009-2412", url: "https://bugzilla.suse.com/528714", }, { category: "external", summary: "SUSE Bug 529591 for CVE-2009-2412", url: "https://bugzilla.suse.com/529591", }, { category: "external", summary: "SUSE Bug 802057 for CVE-2009-2412", url: "https://bugzilla.suse.com/802057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2009-2412", }, { cve: "CVE-2009-3560", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-3560", }, ], notes: [ { category: "general", text: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-3560", url: "https://www.suse.com/security/cve/CVE-2009-3560", }, { category: "external", summary: "SUSE Bug 550666 for CVE-2009-3560", url: "https://bugzilla.suse.com/550666", }, { category: "external", summary: "SUSE Bug 558892 for CVE-2009-3560", url: "https://bugzilla.suse.com/558892", }, { category: "external", summary: "SUSE Bug 561561 for CVE-2009-3560", url: "https://bugzilla.suse.com/561561", }, { category: "external", summary: "SUSE Bug 581162 for CVE-2009-3560", url: "https://bugzilla.suse.com/581162", }, { category: "external", summary: "SUSE Bug 581765 for CVE-2009-3560", url: "https://bugzilla.suse.com/581765", }, { category: "external", summary: "SUSE Bug 611931 for CVE-2009-3560", url: "https://bugzilla.suse.com/611931", }, { category: "external", summary: "SUSE Bug 694595 for CVE-2009-3560", url: "https://bugzilla.suse.com/694595", }, { category: "external", summary: "SUSE Bug 725950 for CVE-2009-3560", url: "https://bugzilla.suse.com/725950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-3560", }, { cve: "CVE-2009-3720", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-3720", }, ], notes: [ { category: "general", text: "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-3720", url: "https://www.suse.com/security/cve/CVE-2009-3720", }, { category: "external", summary: "SUSE Bug 534721 for CVE-2009-3720", url: "https://bugzilla.suse.com/534721", }, { category: "external", summary: "SUSE Bug 550664 for CVE-2009-3720", url: "https://bugzilla.suse.com/550664", }, { category: "external", summary: "SUSE Bug 550666 for CVE-2009-3720", url: "https://bugzilla.suse.com/550666", }, { category: "external", summary: "SUSE Bug 558892 for CVE-2009-3720", url: "https://bugzilla.suse.com/558892", }, { category: "external", summary: "SUSE Bug 561561 for CVE-2009-3720", url: "https://bugzilla.suse.com/561561", }, { category: "external", summary: "SUSE Bug 581162 for CVE-2009-3720", url: "https://bugzilla.suse.com/581162", }, { category: "external", summary: "SUSE Bug 581765 for CVE-2009-3720", url: "https://bugzilla.suse.com/581765", }, { category: "external", summary: "SUSE Bug 611931 for CVE-2009-3720", url: "https://bugzilla.suse.com/611931", }, { category: "external", summary: "SUSE Bug 725950 for CVE-2009-3720", url: "https://bugzilla.suse.com/725950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-3720", }, { cve: "CVE-2010-1623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-1623", }, ], notes: [ { category: "general", text: "Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-1623", url: "https://www.suse.com/security/cve/CVE-2010-1623", }, { category: "external", summary: "SUSE Bug 650435 for CVE-2010-1623", url: "https://bugzilla.suse.com/650435", }, { category: "external", summary: "SUSE Bug 693778 for CVE-2010-1623", url: "https://bugzilla.suse.com/693778", }, { category: "external", summary: "SUSE Bug 725950 for CVE-2010-1623", url: "https://bugzilla.suse.com/725950", }, { category: "external", summary: "SUSE Bug 997229 for CVE-2010-1623", url: "https://bugzilla.suse.com/997229", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-mysql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-pgsql-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-dbd-sqlite3-1.5.4-4.4.x86_64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.aarch64", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.ppc64le", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.s390x", "openSUSE Tumbleweed:libapr-util1-devel-1.5.4-4.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2010-1623", }, ], }
opensuse-su-2024:10268-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
apache2-2.4.23-4.1 on GA media
Notes
Title of the patch
apache2-2.4.23-4.1 on GA media
Description of the patch
These are all security issues fixed in the apache2-2.4.23-4.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10268
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "apache2-2.4.23-4.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the apache2-2.4.23-4.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10268", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10268-1.json", }, { category: "self", summary: "SUSE CVE CVE-2009-0023 page", url: "https://www.suse.com/security/cve/CVE-2009-0023/", }, { category: "self", summary: "SUSE CVE CVE-2009-1191 page", url: "https://www.suse.com/security/cve/CVE-2009-1191/", }, { category: "self", summary: "SUSE CVE CVE-2009-1195 page", url: "https://www.suse.com/security/cve/CVE-2009-1195/", }, { category: "self", summary: "SUSE CVE CVE-2009-1890 page", url: "https://www.suse.com/security/cve/CVE-2009-1890/", }, { category: "self", summary: "SUSE CVE CVE-2009-1891 page", url: "https://www.suse.com/security/cve/CVE-2009-1891/", }, { category: "self", summary: "SUSE CVE CVE-2009-1955 page", url: "https://www.suse.com/security/cve/CVE-2009-1955/", }, { category: "self", summary: "SUSE CVE CVE-2009-1956 page", url: "https://www.suse.com/security/cve/CVE-2009-1956/", }, { category: "self", summary: "SUSE CVE CVE-2009-2412 page", url: "https://www.suse.com/security/cve/CVE-2009-2412/", }, { category: "self", summary: "SUSE CVE CVE-2009-2699 page", url: "https://www.suse.com/security/cve/CVE-2009-2699/", }, { category: "self", summary: "SUSE CVE CVE-2009-3094 page", url: "https://www.suse.com/security/cve/CVE-2009-3094/", }, { category: "self", summary: "SUSE CVE CVE-2009-3095 page", url: "https://www.suse.com/security/cve/CVE-2009-3095/", }, { category: "self", summary: "SUSE CVE CVE-2009-3555 page", url: "https://www.suse.com/security/cve/CVE-2009-3555/", }, { category: "self", summary: "SUSE CVE CVE-2009-3560 page", url: "https://www.suse.com/security/cve/CVE-2009-3560/", }, { category: "self", summary: "SUSE CVE CVE-2009-3720 page", url: "https://www.suse.com/security/cve/CVE-2009-3720/", }, { category: "self", summary: "SUSE CVE CVE-2010-0408 page", url: "https://www.suse.com/security/cve/CVE-2010-0408/", }, { category: "self", summary: "SUSE CVE CVE-2010-0425 page", url: "https://www.suse.com/security/cve/CVE-2010-0425/", }, { category: "self", summary: "SUSE CVE CVE-2010-0434 page", url: "https://www.suse.com/security/cve/CVE-2010-0434/", }, { category: "self", summary: "SUSE CVE CVE-2010-1452 page", url: "https://www.suse.com/security/cve/CVE-2010-1452/", }, { category: "self", summary: "SUSE CVE CVE-2010-1623 page", url: "https://www.suse.com/security/cve/CVE-2010-1623/", }, { category: "self", summary: "SUSE CVE CVE-2010-2068 page", url: "https://www.suse.com/security/cve/CVE-2010-2068/", }, { category: "self", summary: "SUSE CVE CVE-2011-1176 page", url: "https://www.suse.com/security/cve/CVE-2011-1176/", }, { category: "self", summary: "SUSE CVE CVE-2011-3192 page", url: "https://www.suse.com/security/cve/CVE-2011-3192/", }, { category: "self", summary: "SUSE CVE CVE-2011-3368 page", url: "https://www.suse.com/security/cve/CVE-2011-3368/", }, { category: "self", summary: "SUSE CVE CVE-2011-3607 page", url: "https://www.suse.com/security/cve/CVE-2011-3607/", }, { category: "self", summary: "SUSE CVE CVE-2011-4317 page", url: "https://www.suse.com/security/cve/CVE-2011-4317/", }, { category: "self", summary: "SUSE CVE CVE-2012-0021 page", url: "https://www.suse.com/security/cve/CVE-2012-0021/", }, { category: "self", summary: "SUSE CVE CVE-2012-0031 page", url: "https://www.suse.com/security/cve/CVE-2012-0031/", }, { category: "self", summary: "SUSE CVE CVE-2012-0053 page", url: "https://www.suse.com/security/cve/CVE-2012-0053/", }, { category: "self", summary: "SUSE CVE CVE-2012-2687 page", url: "https://www.suse.com/security/cve/CVE-2012-2687/", }, { category: "self", summary: "SUSE CVE CVE-2012-3499 page", url: "https://www.suse.com/security/cve/CVE-2012-3499/", }, { category: "self", summary: "SUSE CVE CVE-2012-3502 page", url: "https://www.suse.com/security/cve/CVE-2012-3502/", }, { category: "self", summary: "SUSE CVE CVE-2013-1896 page", url: "https://www.suse.com/security/cve/CVE-2013-1896/", }, { category: "self", summary: "SUSE CVE CVE-2013-2249 page", url: "https://www.suse.com/security/cve/CVE-2013-2249/", }, { category: "self", summary: "SUSE CVE CVE-2013-5704 page", url: "https://www.suse.com/security/cve/CVE-2013-5704/", }, { category: "self", summary: "SUSE CVE CVE-2013-6438 page", url: "https://www.suse.com/security/cve/CVE-2013-6438/", }, { category: "self", summary: "SUSE CVE CVE-2014-0098 page", url: "https://www.suse.com/security/cve/CVE-2014-0098/", }, { category: "self", summary: "SUSE CVE CVE-2014-0117 page", url: "https://www.suse.com/security/cve/CVE-2014-0117/", }, { category: "self", summary: "SUSE CVE CVE-2014-0118 page", url: "https://www.suse.com/security/cve/CVE-2014-0118/", }, { category: "self", summary: "SUSE CVE CVE-2014-0226 page", url: "https://www.suse.com/security/cve/CVE-2014-0226/", }, { category: "self", summary: "SUSE CVE CVE-2014-0231 page", url: "https://www.suse.com/security/cve/CVE-2014-0231/", }, { category: "self", summary: "SUSE CVE CVE-2014-3523 page", url: "https://www.suse.com/security/cve/CVE-2014-3523/", }, { category: "self", summary: "SUSE CVE CVE-2014-3581 page", url: "https://www.suse.com/security/cve/CVE-2014-3581/", }, { category: "self", summary: "SUSE CVE CVE-2014-3583 page", url: "https://www.suse.com/security/cve/CVE-2014-3583/", }, { category: "self", summary: "SUSE CVE CVE-2014-8109 page", url: "https://www.suse.com/security/cve/CVE-2014-8109/", }, { category: "self", summary: "SUSE CVE CVE-2015-0228 page", url: "https://www.suse.com/security/cve/CVE-2015-0228/", }, { category: "self", summary: "SUSE CVE CVE-2015-0253 page", url: "https://www.suse.com/security/cve/CVE-2015-0253/", }, { category: "self", summary: "SUSE CVE CVE-2015-4000 page", url: "https://www.suse.com/security/cve/CVE-2015-4000/", }, { category: "self", summary: "SUSE CVE CVE-2016-4979 page", url: "https://www.suse.com/security/cve/CVE-2016-4979/", }, ], title: "apache2-2.4.23-4.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10268-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "apache2-2.4.23-4.1.aarch64", product: { name: "apache2-2.4.23-4.1.aarch64", product_id: "apache2-2.4.23-4.1.aarch64", }, }, { category: "product_version", name: "apache2-devel-2.4.23-4.1.aarch64", product: { name: "apache2-devel-2.4.23-4.1.aarch64", product_id: "apache2-devel-2.4.23-4.1.aarch64", }, }, { category: "product_version", name: "apache2-doc-2.4.23-4.1.aarch64", product: { name: "apache2-doc-2.4.23-4.1.aarch64", product_id: "apache2-doc-2.4.23-4.1.aarch64", }, }, { category: "product_version", name: "apache2-event-2.4.23-4.1.aarch64", product: { name: "apache2-event-2.4.23-4.1.aarch64", product_id: "apache2-event-2.4.23-4.1.aarch64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.23-4.1.aarch64", product: { name: "apache2-example-pages-2.4.23-4.1.aarch64", product_id: "apache2-example-pages-2.4.23-4.1.aarch64", }, }, { category: "product_version", name: "apache2-prefork-2.4.23-4.1.aarch64", product: { name: "apache2-prefork-2.4.23-4.1.aarch64", product_id: "apache2-prefork-2.4.23-4.1.aarch64", }, }, { category: "product_version", name: "apache2-utils-2.4.23-4.1.aarch64", product: { name: "apache2-utils-2.4.23-4.1.aarch64", product_id: "apache2-utils-2.4.23-4.1.aarch64", }, }, { category: "product_version", name: "apache2-worker-2.4.23-4.1.aarch64", product: { name: "apache2-worker-2.4.23-4.1.aarch64", product_id: "apache2-worker-2.4.23-4.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "apache2-2.4.23-4.1.ppc64le", product: { name: "apache2-2.4.23-4.1.ppc64le", product_id: "apache2-2.4.23-4.1.ppc64le", }, }, { category: "product_version", name: "apache2-devel-2.4.23-4.1.ppc64le", product: { name: "apache2-devel-2.4.23-4.1.ppc64le", product_id: "apache2-devel-2.4.23-4.1.ppc64le", }, }, { category: "product_version", name: "apache2-doc-2.4.23-4.1.ppc64le", product: { name: "apache2-doc-2.4.23-4.1.ppc64le", product_id: "apache2-doc-2.4.23-4.1.ppc64le", }, }, { category: "product_version", name: "apache2-event-2.4.23-4.1.ppc64le", product: { name: "apache2-event-2.4.23-4.1.ppc64le", product_id: "apache2-event-2.4.23-4.1.ppc64le", }, }, { category: "product_version", name: "apache2-example-pages-2.4.23-4.1.ppc64le", product: { name: "apache2-example-pages-2.4.23-4.1.ppc64le", product_id: "apache2-example-pages-2.4.23-4.1.ppc64le", }, }, { category: "product_version", name: "apache2-prefork-2.4.23-4.1.ppc64le", product: { name: "apache2-prefork-2.4.23-4.1.ppc64le", product_id: "apache2-prefork-2.4.23-4.1.ppc64le", }, }, { category: "product_version", name: "apache2-utils-2.4.23-4.1.ppc64le", product: { name: "apache2-utils-2.4.23-4.1.ppc64le", product_id: "apache2-utils-2.4.23-4.1.ppc64le", }, }, { category: "product_version", name: "apache2-worker-2.4.23-4.1.ppc64le", product: { name: "apache2-worker-2.4.23-4.1.ppc64le", product_id: "apache2-worker-2.4.23-4.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "apache2-2.4.23-4.1.s390x", product: { name: "apache2-2.4.23-4.1.s390x", product_id: "apache2-2.4.23-4.1.s390x", }, }, { category: "product_version", name: "apache2-devel-2.4.23-4.1.s390x", product: { name: "apache2-devel-2.4.23-4.1.s390x", product_id: "apache2-devel-2.4.23-4.1.s390x", }, }, { category: "product_version", name: "apache2-doc-2.4.23-4.1.s390x", product: { name: "apache2-doc-2.4.23-4.1.s390x", product_id: "apache2-doc-2.4.23-4.1.s390x", }, }, { category: "product_version", name: "apache2-event-2.4.23-4.1.s390x", product: { name: "apache2-event-2.4.23-4.1.s390x", product_id: "apache2-event-2.4.23-4.1.s390x", }, }, { category: "product_version", name: "apache2-example-pages-2.4.23-4.1.s390x", product: { name: "apache2-example-pages-2.4.23-4.1.s390x", product_id: "apache2-example-pages-2.4.23-4.1.s390x", }, }, { category: "product_version", name: "apache2-prefork-2.4.23-4.1.s390x", product: { name: "apache2-prefork-2.4.23-4.1.s390x", product_id: "apache2-prefork-2.4.23-4.1.s390x", }, }, { category: "product_version", name: "apache2-utils-2.4.23-4.1.s390x", product: { name: "apache2-utils-2.4.23-4.1.s390x", product_id: "apache2-utils-2.4.23-4.1.s390x", }, }, { category: "product_version", name: "apache2-worker-2.4.23-4.1.s390x", product: { name: "apache2-worker-2.4.23-4.1.s390x", product_id: "apache2-worker-2.4.23-4.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "apache2-2.4.23-4.1.x86_64", product: { name: "apache2-2.4.23-4.1.x86_64", product_id: "apache2-2.4.23-4.1.x86_64", }, }, { category: "product_version", name: "apache2-devel-2.4.23-4.1.x86_64", product: { name: "apache2-devel-2.4.23-4.1.x86_64", product_id: "apache2-devel-2.4.23-4.1.x86_64", }, }, { category: "product_version", name: "apache2-doc-2.4.23-4.1.x86_64", product: { name: "apache2-doc-2.4.23-4.1.x86_64", product_id: "apache2-doc-2.4.23-4.1.x86_64", }, }, { category: "product_version", name: "apache2-event-2.4.23-4.1.x86_64", product: { name: "apache2-event-2.4.23-4.1.x86_64", product_id: "apache2-event-2.4.23-4.1.x86_64", }, }, { category: "product_version", name: "apache2-example-pages-2.4.23-4.1.x86_64", product: { name: "apache2-example-pages-2.4.23-4.1.x86_64", product_id: "apache2-example-pages-2.4.23-4.1.x86_64", }, }, { category: "product_version", name: "apache2-prefork-2.4.23-4.1.x86_64", product: { name: "apache2-prefork-2.4.23-4.1.x86_64", product_id: "apache2-prefork-2.4.23-4.1.x86_64", }, }, { category: "product_version", name: "apache2-utils-2.4.23-4.1.x86_64", product: { name: "apache2-utils-2.4.23-4.1.x86_64", product_id: "apache2-utils-2.4.23-4.1.x86_64", }, }, { category: "product_version", name: "apache2-worker-2.4.23-4.1.x86_64", product: { name: "apache2-worker-2.4.23-4.1.x86_64", product_id: "apache2-worker-2.4.23-4.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-4.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", }, product_reference: "apache2-2.4.23-4.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-4.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", }, product_reference: "apache2-2.4.23-4.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-4.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", }, product_reference: "apache2-2.4.23-4.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-2.4.23-4.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", }, product_reference: "apache2-2.4.23-4.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.23-4.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", }, product_reference: "apache2-devel-2.4.23-4.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.23-4.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", }, product_reference: "apache2-devel-2.4.23-4.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.23-4.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", }, product_reference: "apache2-devel-2.4.23-4.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-devel-2.4.23-4.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", }, product_reference: "apache2-devel-2.4.23-4.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-4.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", }, product_reference: "apache2-doc-2.4.23-4.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-4.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", }, product_reference: "apache2-doc-2.4.23-4.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-4.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", }, product_reference: "apache2-doc-2.4.23-4.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-doc-2.4.23-4.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", }, product_reference: "apache2-doc-2.4.23-4.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.23-4.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", }, product_reference: "apache2-event-2.4.23-4.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.23-4.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", }, product_reference: "apache2-event-2.4.23-4.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.23-4.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", }, product_reference: "apache2-event-2.4.23-4.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-event-2.4.23-4.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", }, product_reference: "apache2-event-2.4.23-4.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-4.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", }, product_reference: "apache2-example-pages-2.4.23-4.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-4.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", }, product_reference: "apache2-example-pages-2.4.23-4.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-4.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", }, product_reference: "apache2-example-pages-2.4.23-4.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-example-pages-2.4.23-4.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", }, product_reference: "apache2-example-pages-2.4.23-4.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-4.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", }, product_reference: "apache2-prefork-2.4.23-4.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-4.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", }, product_reference: "apache2-prefork-2.4.23-4.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-4.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", }, product_reference: "apache2-prefork-2.4.23-4.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-prefork-2.4.23-4.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", }, product_reference: "apache2-prefork-2.4.23-4.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-4.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", }, product_reference: "apache2-utils-2.4.23-4.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-4.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", }, product_reference: "apache2-utils-2.4.23-4.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-4.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", }, product_reference: "apache2-utils-2.4.23-4.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-utils-2.4.23-4.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", }, product_reference: "apache2-utils-2.4.23-4.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-4.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", }, product_reference: "apache2-worker-2.4.23-4.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-4.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", }, product_reference: "apache2-worker-2.4.23-4.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-4.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", }, product_reference: "apache2-worker-2.4.23-4.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "apache2-worker-2.4.23-4.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", }, product_reference: "apache2-worker-2.4.23-4.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2009-0023", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-0023", }, ], notes: [ { category: "general", text: "The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-0023", url: "https://www.suse.com/security/cve/CVE-2009-0023", }, { category: "external", summary: "SUSE Bug 510301 for CVE-2009-0023", url: "https://bugzilla.suse.com/510301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-0023", }, { cve: "CVE-2009-1191", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-1191", }, ], notes: [ { category: "general", text: "mod_proxy_ajp.c in the mod_proxy_ajp module in the Apache HTTP Server 2.2.11 allows remote attackers to obtain sensitive response data, intended for a client that sent an earlier POST request with no request body, via an HTTP request.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-1191", url: "https://www.suse.com/security/cve/CVE-2009-1191", }, { category: "external", summary: "SUSE Bug 521943 for CVE-2009-1191", url: "https://bugzilla.suse.com/521943", }, { category: "external", summary: "SUSE Bug 539571 for CVE-2009-1191", url: "https://bugzilla.suse.com/539571", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-1191", }, { cve: "CVE-2009-1195", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-1195", }, ], notes: [ { category: "general", text: "The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-1195", url: "https://www.suse.com/security/cve/CVE-2009-1195", }, { category: "external", summary: "SUSE Bug 512583 for CVE-2009-1195", url: "https://bugzilla.suse.com/512583", }, { category: "external", summary: "SUSE Bug 513080 for CVE-2009-1195", url: "https://bugzilla.suse.com/513080", }, { category: "external", summary: "SUSE Bug 539571 for CVE-2009-1195", url: "https://bugzilla.suse.com/539571", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-1195", }, { cve: "CVE-2009-1890", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-1890", }, ], notes: [ { category: "general", text: "The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-1890", url: "https://www.suse.com/security/cve/CVE-2009-1890", }, { category: "external", summary: "SUSE Bug 519194 for CVE-2009-1890", url: "https://bugzilla.suse.com/519194", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2009-1890", }, { cve: "CVE-2009-1891", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-1891", }, ], notes: [ { category: "general", text: "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-1891", url: "https://www.suse.com/security/cve/CVE-2009-1891", }, { category: "external", summary: "SUSE Bug 521906 for CVE-2009-1891", url: "https://bugzilla.suse.com/521906", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2009-1891", }, { cve: "CVE-2009-1955", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-1955", }, ], notes: [ { category: "general", text: "The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-1955", url: "https://www.suse.com/security/cve/CVE-2009-1955", }, { category: "external", summary: "SUSE Bug 509825 for CVE-2009-1955", url: "https://bugzilla.suse.com/509825", }, { category: "external", summary: "SUSE Bug 510301 for CVE-2009-1955", url: "https://bugzilla.suse.com/510301", }, { category: "external", summary: "SUSE Bug 529591 for CVE-2009-1955", url: "https://bugzilla.suse.com/529591", }, { category: "external", summary: "SUSE Bug 992541 for CVE-2009-1955", url: "https://bugzilla.suse.com/992541", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2009-1955", }, { cve: "CVE-2009-1956", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-1956", }, ], notes: [ { category: "general", text: "Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-1956", url: "https://www.suse.com/security/cve/CVE-2009-1956", }, { category: "external", summary: "SUSE Bug 510301 for CVE-2009-1956", url: "https://bugzilla.suse.com/510301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-1956", }, { cve: "CVE-2009-2412", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-2412", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-2412", url: "https://www.suse.com/security/cve/CVE-2009-2412", }, { category: "external", summary: "SUSE Bug 528714 for CVE-2009-2412", url: "https://bugzilla.suse.com/528714", }, { category: "external", summary: "SUSE Bug 529591 for CVE-2009-2412", url: "https://bugzilla.suse.com/529591", }, { category: "external", summary: "SUSE Bug 802057 for CVE-2009-2412", url: "https://bugzilla.suse.com/802057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2009-2412", }, { cve: "CVE-2009-2699", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-2699", }, ], notes: [ { category: "general", text: "The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-2699", url: "https://www.suse.com/security/cve/CVE-2009-2699", }, { category: "external", summary: "SUSE Bug 1078450 for CVE-2009-2699", url: "https://bugzilla.suse.com/1078450", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2009-2699", }, { cve: "CVE-2009-3094", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-3094", }, ], notes: [ { category: "general", text: "The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-3094", url: "https://www.suse.com/security/cve/CVE-2009-3094", }, { category: "external", summary: "SUSE Bug 538322 for CVE-2009-3094", url: "https://bugzilla.suse.com/538322", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-3094", }, { cve: "CVE-2009-3095", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-3095", }, ], notes: [ { category: "general", text: "The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-3095", url: "https://www.suse.com/security/cve/CVE-2009-3095", }, { category: "external", summary: "SUSE Bug 538322 for CVE-2009-3095", url: "https://bugzilla.suse.com/538322", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-3095", }, { cve: "CVE-2009-3555", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-3555", }, ], notes: [ { category: "general", text: "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-3555", url: "https://www.suse.com/security/cve/CVE-2009-3555", }, { category: "external", summary: "SUSE Bug 1077582 for CVE-2009-3555", url: "https://bugzilla.suse.com/1077582", }, { category: "external", summary: "SUSE Bug 459468 for CVE-2009-3555", url: "https://bugzilla.suse.com/459468", }, { category: "external", summary: "SUSE Bug 552497 for CVE-2009-3555", url: "https://bugzilla.suse.com/552497", }, { category: "external", summary: "SUSE Bug 553641 for CVE-2009-3555", url: "https://bugzilla.suse.com/553641", }, { category: "external", summary: "SUSE Bug 554069 for CVE-2009-3555", url: "https://bugzilla.suse.com/554069", }, { category: "external", summary: "SUSE Bug 554084 for CVE-2009-3555", url: "https://bugzilla.suse.com/554084", }, { category: "external", summary: "SUSE Bug 554085 for CVE-2009-3555", url: "https://bugzilla.suse.com/554085", }, { category: "external", summary: "SUSE Bug 555177 for CVE-2009-3555", url: "https://bugzilla.suse.com/555177", }, { category: "external", summary: "SUSE Bug 557168 for CVE-2009-3555", url: "https://bugzilla.suse.com/557168", }, { category: "external", summary: "SUSE Bug 564507 for CVE-2009-3555", url: "https://bugzilla.suse.com/564507", }, { category: "external", summary: "SUSE Bug 566041 for CVE-2009-3555", url: "https://bugzilla.suse.com/566041", }, { category: "external", summary: "SUSE Bug 584292 for CVE-2009-3555", url: "https://bugzilla.suse.com/584292", }, { category: "external", summary: "SUSE Bug 586567 for CVE-2009-3555", url: "https://bugzilla.suse.com/586567", }, { category: "external", summary: "SUSE Bug 588996 for CVE-2009-3555", url: "https://bugzilla.suse.com/588996", }, { category: "external", summary: "SUSE Bug 590826 for CVE-2009-3555", url: "https://bugzilla.suse.com/590826", }, { category: "external", summary: "SUSE Bug 592589 for CVE-2009-3555", url: "https://bugzilla.suse.com/592589", }, { category: "external", summary: "SUSE Bug 594415 for CVE-2009-3555", url: "https://bugzilla.suse.com/594415", }, { category: "external", summary: "SUSE Bug 604782 for CVE-2009-3555", url: "https://bugzilla.suse.com/604782", }, { category: "external", summary: "SUSE Bug 614753 for CVE-2009-3555", url: "https://bugzilla.suse.com/614753", }, { category: "external", summary: "SUSE Bug 622073 for CVE-2009-3555", url: "https://bugzilla.suse.com/622073", }, { category: "external", summary: "SUSE Bug 623905 for CVE-2009-3555", url: "https://bugzilla.suse.com/623905", }, { category: "external", summary: "SUSE Bug 629905 for CVE-2009-3555", url: "https://bugzilla.suse.com/629905", }, { category: "external", summary: "SUSE Bug 642531 for CVE-2009-3555", url: "https://bugzilla.suse.com/642531", }, { category: "external", summary: "SUSE Bug 646073 for CVE-2009-3555", url: "https://bugzilla.suse.com/646073", }, { category: "external", summary: "SUSE Bug 646906 for CVE-2009-3555", url: "https://bugzilla.suse.com/646906", }, { category: "external", summary: "SUSE Bug 648140 for CVE-2009-3555", url: "https://bugzilla.suse.com/648140", }, { category: "external", summary: "SUSE Bug 648950 for CVE-2009-3555", url: "https://bugzilla.suse.com/648950", }, { category: "external", summary: "SUSE Bug 659926 for CVE-2009-3555", url: "https://bugzilla.suse.com/659926", }, { category: "external", summary: "SUSE Bug 670152 for CVE-2009-3555", url: "https://bugzilla.suse.com/670152", }, { category: "external", summary: "SUSE Bug 704832 for CVE-2009-3555", url: "https://bugzilla.suse.com/704832", }, { category: "external", summary: "SUSE Bug 728876 for CVE-2009-3555", url: "https://bugzilla.suse.com/728876", }, { category: "external", summary: "SUSE Bug 729181 for CVE-2009-3555", url: "https://bugzilla.suse.com/729181", }, { category: "external", summary: "SUSE Bug 753357 for CVE-2009-3555", url: "https://bugzilla.suse.com/753357", }, { category: "external", summary: "SUSE Bug 791794 for CVE-2009-3555", url: "https://bugzilla.suse.com/791794", }, { category: "external", summary: "SUSE Bug 799454 for CVE-2009-3555", url: "https://bugzilla.suse.com/799454", }, { category: "external", summary: "SUSE Bug 815621 for CVE-2009-3555", url: "https://bugzilla.suse.com/815621", }, { category: "external", summary: "SUSE Bug 905347 for CVE-2009-3555", url: "https://bugzilla.suse.com/905347", }, { category: "external", summary: "SUSE Bug 979060 for CVE-2009-3555", url: "https://bugzilla.suse.com/979060", }, { category: "external", summary: "SUSE Bug 986238 for CVE-2009-3555", url: "https://bugzilla.suse.com/986238", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-3555", }, { cve: "CVE-2009-3560", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-3560", }, ], notes: [ { category: "general", text: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-3560", url: "https://www.suse.com/security/cve/CVE-2009-3560", }, { category: "external", summary: "SUSE Bug 550666 for CVE-2009-3560", url: "https://bugzilla.suse.com/550666", }, { category: "external", summary: "SUSE Bug 558892 for CVE-2009-3560", url: "https://bugzilla.suse.com/558892", }, { category: "external", summary: "SUSE Bug 561561 for CVE-2009-3560", url: "https://bugzilla.suse.com/561561", }, { category: "external", summary: "SUSE Bug 581162 for CVE-2009-3560", url: "https://bugzilla.suse.com/581162", }, { category: "external", summary: "SUSE Bug 581765 for CVE-2009-3560", url: "https://bugzilla.suse.com/581765", }, { category: "external", summary: "SUSE Bug 611931 for CVE-2009-3560", url: "https://bugzilla.suse.com/611931", }, { category: "external", summary: "SUSE Bug 694595 for CVE-2009-3560", url: "https://bugzilla.suse.com/694595", }, { category: "external", summary: "SUSE Bug 725950 for CVE-2009-3560", url: "https://bugzilla.suse.com/725950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-3560", }, { cve: "CVE-2009-3720", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-3720", }, ], notes: [ { category: "general", text: "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2009-3720", url: "https://www.suse.com/security/cve/CVE-2009-3720", }, { category: "external", summary: "SUSE Bug 534721 for CVE-2009-3720", url: "https://bugzilla.suse.com/534721", }, { category: "external", summary: "SUSE Bug 550664 for CVE-2009-3720", url: "https://bugzilla.suse.com/550664", }, { category: "external", summary: "SUSE Bug 550666 for CVE-2009-3720", url: "https://bugzilla.suse.com/550666", }, { category: "external", summary: "SUSE Bug 558892 for CVE-2009-3720", url: "https://bugzilla.suse.com/558892", }, { category: "external", summary: "SUSE Bug 561561 for CVE-2009-3720", url: "https://bugzilla.suse.com/561561", }, { category: "external", summary: "SUSE Bug 581162 for CVE-2009-3720", url: "https://bugzilla.suse.com/581162", }, { category: "external", summary: "SUSE Bug 581765 for CVE-2009-3720", url: "https://bugzilla.suse.com/581765", }, { category: "external", summary: "SUSE Bug 611931 for CVE-2009-3720", url: "https://bugzilla.suse.com/611931", }, { category: "external", summary: "SUSE Bug 725950 for CVE-2009-3720", url: "https://bugzilla.suse.com/725950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2009-3720", }, { cve: "CVE-2010-0408", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-0408", }, ], notes: [ { category: "general", text: "The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-0408", url: "https://www.suse.com/security/cve/CVE-2010-0408", }, { category: "external", summary: "SUSE Bug 586572 for CVE-2010-0408", url: "https://bugzilla.suse.com/586572", }, { category: "external", summary: "SUSE Bug 601151 for CVE-2010-0408", url: "https://bugzilla.suse.com/601151", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2010-0408", }, { cve: "CVE-2010-0425", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-0425", }, ], notes: [ { category: "general", text: "modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and \"orphaned callback pointers.\"", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-0425", url: "https://www.suse.com/security/cve/CVE-2010-0425", }, { category: "external", summary: "SUSE Bug 1078450 for CVE-2010-0425", url: "https://bugzilla.suse.com/1078450", }, { category: "external", summary: "SUSE Bug 586572 for CVE-2010-0425", url: "https://bugzilla.suse.com/586572", }, { category: "external", summary: "SUSE Bug 601151 for CVE-2010-0425", url: "https://bugzilla.suse.com/601151", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2010-0425", }, { cve: "CVE-2010-0434", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-0434", }, ], notes: [ { category: "general", text: "The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-0434", url: "https://www.suse.com/security/cve/CVE-2010-0434", }, { category: "external", summary: "SUSE Bug 586572 for CVE-2010-0434", url: "https://bugzilla.suse.com/586572", }, { category: "external", summary: "SUSE Bug 601151 for CVE-2010-0434", url: "https://bugzilla.suse.com/601151", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2010-0434", }, { cve: "CVE-2010-1452", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-1452", }, ], notes: [ { category: "general", text: "The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-1452", url: "https://www.suse.com/security/cve/CVE-2010-1452", }, { category: "external", summary: "SUSE Bug 627030 for CVE-2010-1452", url: "https://bugzilla.suse.com/627030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2010-1452", }, { cve: "CVE-2010-1623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-1623", }, ], notes: [ { category: "general", text: "Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-1623", url: "https://www.suse.com/security/cve/CVE-2010-1623", }, { category: "external", summary: "SUSE Bug 650435 for CVE-2010-1623", url: "https://bugzilla.suse.com/650435", }, { category: "external", summary: "SUSE Bug 693778 for CVE-2010-1623", url: "https://bugzilla.suse.com/693778", }, { category: "external", summary: "SUSE Bug 725950 for CVE-2010-1623", url: "https://bugzilla.suse.com/725950", }, { category: "external", summary: "SUSE Bug 997229 for CVE-2010-1623", url: "https://bugzilla.suse.com/997229", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2010-1623", }, { cve: "CVE-2010-2068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-2068", }, ], notes: [ { category: "general", text: "mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-2068", url: "https://www.suse.com/security/cve/CVE-2010-2068", }, { category: "external", summary: "SUSE Bug 627030 for CVE-2010-2068", url: "https://bugzilla.suse.com/627030", }, { category: "external", summary: "SUSE Bug 627387 for CVE-2010-2068", url: "https://bugzilla.suse.com/627387", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2010-2068", }, { cve: "CVE-2011-1176", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-1176", }, ], notes: [ { category: "general", text: "The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-1176", url: "https://www.suse.com/security/cve/CVE-2011-1176", }, { category: "external", summary: "SUSE Bug 681176 for CVE-2011-1176", url: "https://bugzilla.suse.com/681176", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2011-1176", }, { cve: "CVE-2011-3192", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-3192", }, ], notes: [ { category: "general", text: "The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-3192", url: "https://www.suse.com/security/cve/CVE-2011-3192", }, { category: "external", summary: "SUSE Bug 713966 for CVE-2011-3192", url: "https://bugzilla.suse.com/713966", }, { category: "external", summary: "SUSE Bug 714306 for CVE-2011-3192", url: "https://bugzilla.suse.com/714306", }, { category: "external", summary: "SUSE Bug 716634 for CVE-2011-3192", url: "https://bugzilla.suse.com/716634", }, { category: "external", summary: "SUSE Bug 718106 for CVE-2011-3192", url: "https://bugzilla.suse.com/718106", }, { category: "external", summary: "SUSE Bug 722545 for CVE-2011-3192", url: "https://bugzilla.suse.com/722545", }, { category: "external", summary: "SUSE Bug 726139 for CVE-2011-3192", url: "https://bugzilla.suse.com/726139", }, { category: "external", summary: "SUSE Bug 732051 for CVE-2011-3192", url: "https://bugzilla.suse.com/732051", }, { category: "external", summary: "SUSE Bug 983778 for CVE-2011-3192", url: "https://bugzilla.suse.com/983778", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2011-3192", }, { cve: "CVE-2011-3368", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-3368", }, ], notes: [ { category: "general", text: "The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-3368", url: "https://www.suse.com/security/cve/CVE-2011-3368", }, { category: "external", summary: "SUSE Bug 722545 for CVE-2011-3368", url: "https://bugzilla.suse.com/722545", }, { category: "external", summary: "SUSE Bug 723308 for CVE-2011-3368", url: "https://bugzilla.suse.com/723308", }, { category: "external", summary: "SUSE Bug 728876 for CVE-2011-3368", url: "https://bugzilla.suse.com/728876", }, { category: "external", summary: "SUSE Bug 729181 for CVE-2011-3368", url: "https://bugzilla.suse.com/729181", }, { category: "external", summary: "SUSE Bug 754831 for CVE-2011-3368", url: "https://bugzilla.suse.com/754831", }, { category: "external", summary: "SUSE Bug 791794 for CVE-2011-3368", url: "https://bugzilla.suse.com/791794", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2011-3368", }, { cve: "CVE-2011-3607", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-3607", }, ], notes: [ { category: "general", text: "Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-3607", url: "https://www.suse.com/security/cve/CVE-2011-3607", }, { category: "external", summary: "SUSE Bug 728876 for CVE-2011-3607", url: "https://bugzilla.suse.com/728876", }, { category: "external", summary: "SUSE Bug 729181 for CVE-2011-3607", url: "https://bugzilla.suse.com/729181", }, { category: "external", summary: "SUSE Bug 729183 for CVE-2011-3607", url: "https://bugzilla.suse.com/729183", }, { category: "external", summary: "SUSE Bug 806721 for CVE-2011-3607", url: "https://bugzilla.suse.com/806721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2011-3607", }, { cve: "CVE-2011-4317", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2011-4317", }, ], notes: [ { category: "general", text: "The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2011-4317", url: "https://www.suse.com/security/cve/CVE-2011-4317", }, { category: "external", summary: "SUSE Bug 722545 for CVE-2011-4317", url: "https://bugzilla.suse.com/722545", }, { category: "external", summary: "SUSE Bug 728876 for CVE-2011-4317", url: "https://bugzilla.suse.com/728876", }, { category: "external", summary: "SUSE Bug 729181 for CVE-2011-4317", url: "https://bugzilla.suse.com/729181", }, { category: "external", summary: "SUSE Bug 791794 for CVE-2011-4317", url: "https://bugzilla.suse.com/791794", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2011-4317", }, { cve: "CVE-2012-0021", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-0021", }, ], notes: [ { category: "general", text: "The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-0021", url: "https://www.suse.com/security/cve/CVE-2012-0021", }, { category: "external", summary: "SUSE Bug 1078450 for CVE-2012-0021", url: "https://bugzilla.suse.com/1078450", }, { category: "external", summary: "SUSE Bug 743744 for CVE-2012-0021", url: "https://bugzilla.suse.com/743744", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-0021", }, { cve: "CVE-2012-0031", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-0031", }, ], notes: [ { category: "general", text: "scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-0031", url: "https://www.suse.com/security/cve/CVE-2012-0031", }, { category: "external", summary: "SUSE Bug 741243 for CVE-2012-0031", url: "https://bugzilla.suse.com/741243", }, { category: "external", summary: "SUSE Bug 806721 for CVE-2012-0031", url: "https://bugzilla.suse.com/806721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-0031", }, { cve: "CVE-2012-0053", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-0053", }, ], notes: [ { category: "general", text: "protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-0053", url: "https://www.suse.com/security/cve/CVE-2012-0053", }, { category: "external", summary: "SUSE Bug 743743 for CVE-2012-0053", url: "https://bugzilla.suse.com/743743", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-0053", }, { cve: "CVE-2012-2687", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-2687", }, ], notes: [ { category: "general", text: "Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-2687", url: "https://www.suse.com/security/cve/CVE-2012-2687", }, { category: "external", summary: "SUSE Bug 777260 for CVE-2012-2687", url: "https://bugzilla.suse.com/777260", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2012-2687", }, { cve: "CVE-2012-3499", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-3499", }, ], notes: [ { category: "general", text: "Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-3499", url: "https://www.suse.com/security/cve/CVE-2012-3499", }, { category: "external", summary: "SUSE Bug 806458 for CVE-2012-3499", url: "https://bugzilla.suse.com/806458", }, { category: "external", summary: "SUSE Bug 807511 for CVE-2012-3499", url: "https://bugzilla.suse.com/807511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-3499", }, { cve: "CVE-2012-3502", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-3502", }, ], notes: [ { category: "general", text: "The proxy functionality in (1) mod_proxy_ajp.c in the mod_proxy_ajp module and (2) mod_proxy_http.c in the mod_proxy_http module in the Apache HTTP Server 2.4.x before 2.4.3 does not properly determine the situations that require closing a back-end connection, which allows remote attackers to obtain sensitive information in opportunistic circumstances by reading a response that was intended for a different client.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-3502", url: "https://www.suse.com/security/cve/CVE-2012-3502", }, { category: "external", summary: "SUSE Bug 777119 for CVE-2012-3502", url: "https://bugzilla.suse.com/777119", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2012-3502", }, { cve: "CVE-2013-1896", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-1896", }, ], notes: [ { category: "general", text: "mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-1896", url: "https://www.suse.com/security/cve/CVE-2013-1896", }, { category: "external", summary: "SUSE Bug 829056 for CVE-2013-1896", url: "https://bugzilla.suse.com/829056", }, { category: "external", summary: "SUSE Bug 829057 for CVE-2013-1896", url: "https://bugzilla.suse.com/829057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2013-1896", }, { cve: "CVE-2013-2249", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-2249", }, ], notes: [ { category: "general", text: "mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-2249", url: "https://www.suse.com/security/cve/CVE-2013-2249", }, { category: "external", summary: "SUSE Bug 831113 for CVE-2013-2249", url: "https://bugzilla.suse.com/831113", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2013-2249", }, { cve: "CVE-2013-5704", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-5704", }, ], notes: [ { category: "general", text: "The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass \"RequestHeader unset\" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states \"this is not a security issue in httpd as such.\"", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-5704", url: "https://www.suse.com/security/cve/CVE-2013-5704", }, { category: "external", summary: "SUSE Bug 871310 for CVE-2013-5704", url: "https://bugzilla.suse.com/871310", }, { category: "external", summary: "SUSE Bug 914535 for CVE-2013-5704", url: "https://bugzilla.suse.com/914535", }, { category: "external", summary: "SUSE Bug 930944 for CVE-2013-5704", url: "https://bugzilla.suse.com/930944", }, { category: "external", summary: "SUSE Bug 938728 for CVE-2013-5704", url: "https://bugzilla.suse.com/938728", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2013-5704", }, { cve: "CVE-2013-6438", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2013-6438", }, ], notes: [ { category: "general", text: "The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2013-6438", url: "https://www.suse.com/security/cve/CVE-2013-6438", }, { category: "external", summary: "SUSE Bug 869105 for CVE-2013-6438", url: "https://bugzilla.suse.com/869105", }, { category: "external", summary: "SUSE Bug 869106 for CVE-2013-6438", url: "https://bugzilla.suse.com/869106", }, { category: "external", summary: "SUSE Bug 887765 for CVE-2013-6438", url: "https://bugzilla.suse.com/887765", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2013-6438", }, { cve: "CVE-2014-0098", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-0098", }, ], notes: [ { category: "general", text: "The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-0098", url: "https://www.suse.com/security/cve/CVE-2014-0098", }, { category: "external", summary: "SUSE Bug 869106 for CVE-2014-0098", url: "https://bugzilla.suse.com/869106", }, { category: "external", summary: "SUSE Bug 887765 for CVE-2014-0098", url: "https://bugzilla.suse.com/887765", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-0098", }, { cve: "CVE-2014-0117", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-0117", }, ], notes: [ { category: "general", text: "The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-0117", url: "https://www.suse.com/security/cve/CVE-2014-0117", }, { category: "external", summary: "SUSE Bug 887767 for CVE-2014-0117", url: "https://bugzilla.suse.com/887767", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-0117", }, { cve: "CVE-2014-0118", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-0118", }, ], notes: [ { category: "general", text: "The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-0118", url: "https://www.suse.com/security/cve/CVE-2014-0118", }, { category: "external", summary: "SUSE Bug 1078450 for CVE-2014-0118", url: "https://bugzilla.suse.com/1078450", }, { category: "external", summary: "SUSE Bug 887769 for CVE-2014-0118", url: "https://bugzilla.suse.com/887769", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-0118", }, { cve: "CVE-2014-0226", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-0226", }, ], notes: [ { category: "general", text: "Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-0226", url: "https://www.suse.com/security/cve/CVE-2014-0226", }, { category: "external", summary: "SUSE Bug 887765 for CVE-2014-0226", url: "https://bugzilla.suse.com/887765", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-0226", }, { cve: "CVE-2014-0231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-0231", }, ], notes: [ { category: "general", text: "The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-0231", url: "https://www.suse.com/security/cve/CVE-2014-0231", }, { category: "external", summary: "SUSE Bug 887768 for CVE-2014-0231", url: "https://bugzilla.suse.com/887768", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-0231", }, { cve: "CVE-2014-3523", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3523", }, ], notes: [ { category: "general", text: "Memory leak in the winnt_accept function in server/mpm/winnt/child.c in the WinNT MPM in the Apache HTTP Server 2.4.x before 2.4.10 on Windows, when the default AcceptFilter is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted requests.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3523", url: "https://www.suse.com/security/cve/CVE-2014-3523", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-3523", }, { cve: "CVE-2014-3581", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3581", }, ], notes: [ { category: "general", text: "The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server before 2.4.11 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3581", url: "https://www.suse.com/security/cve/CVE-2014-3581", }, { category: "external", summary: "SUSE Bug 899836 for CVE-2014-3581", url: "https://bugzilla.suse.com/899836", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-3581", }, { cve: "CVE-2014-3583", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-3583", }, ], notes: [ { category: "general", text: "The handle_headers function in mod_proxy_fcgi.c in the mod_proxy_fcgi module in the Apache HTTP Server 2.4.10 allows remote FastCGI servers to cause a denial of service (buffer over-read and daemon crash) via long response headers.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-3583", url: "https://www.suse.com/security/cve/CVE-2014-3583", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-3583", }, { cve: "CVE-2014-8109", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-8109", }, ], notes: [ { category: "general", text: "mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-8109", url: "https://www.suse.com/security/cve/CVE-2014-8109", }, { category: "external", summary: "SUSE Bug 909715 for CVE-2014-8109", url: "https://bugzilla.suse.com/909715", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-8109", }, { cve: "CVE-2015-0228", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0228", }, ], notes: [ { category: "general", text: "The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0228", url: "https://www.suse.com/security/cve/CVE-2015-0228", }, { category: "external", summary: "SUSE Bug 918352 for CVE-2015-0228", url: "https://bugzilla.suse.com/918352", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2015-0228", }, { cve: "CVE-2015-0253", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0253", }, ], notes: [ { category: "general", text: "The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INCLUDES filter and has an ErrorDocument 400 directive specifying a local URI.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0253", url: "https://www.suse.com/security/cve/CVE-2015-0253", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2015-0253", }, { cve: "CVE-2015-4000", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-4000", }, ], notes: [ { category: "general", text: "The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-4000", url: "https://www.suse.com/security/cve/CVE-2015-4000", }, { category: "external", summary: "SUSE Bug 1074631 for CVE-2015-4000", url: "https://bugzilla.suse.com/1074631", }, { category: "external", summary: "SUSE Bug 1211968 for CVE-2015-4000", url: "https://bugzilla.suse.com/1211968", }, { category: "external", summary: "SUSE Bug 931600 for CVE-2015-4000", url: "https://bugzilla.suse.com/931600", }, { category: "external", summary: "SUSE Bug 931698 for CVE-2015-4000", url: "https://bugzilla.suse.com/931698", }, { category: "external", summary: "SUSE Bug 931723 for CVE-2015-4000", url: "https://bugzilla.suse.com/931723", }, { category: "external", summary: "SUSE Bug 931845 for CVE-2015-4000", url: "https://bugzilla.suse.com/931845", }, { category: "external", summary: "SUSE Bug 932026 for CVE-2015-4000", url: "https://bugzilla.suse.com/932026", }, { category: "external", summary: "SUSE Bug 932483 for CVE-2015-4000", url: "https://bugzilla.suse.com/932483", }, { category: "external", summary: "SUSE Bug 934789 for CVE-2015-4000", url: "https://bugzilla.suse.com/934789", }, { category: "external", summary: "SUSE Bug 935033 for CVE-2015-4000", url: "https://bugzilla.suse.com/935033", }, { category: "external", summary: "SUSE Bug 935540 for CVE-2015-4000", url: "https://bugzilla.suse.com/935540", }, { category: "external", summary: "SUSE Bug 935979 for CVE-2015-4000", url: "https://bugzilla.suse.com/935979", }, { category: "external", summary: "SUSE Bug 937202 for CVE-2015-4000", url: "https://bugzilla.suse.com/937202", }, { category: "external", summary: "SUSE Bug 937766 for CVE-2015-4000", url: "https://bugzilla.suse.com/937766", }, { category: "external", summary: "SUSE Bug 938248 for CVE-2015-4000", url: "https://bugzilla.suse.com/938248", }, { category: "external", summary: "SUSE Bug 938432 for CVE-2015-4000", url: "https://bugzilla.suse.com/938432", }, { category: "external", summary: "SUSE Bug 938895 for CVE-2015-4000", url: "https://bugzilla.suse.com/938895", }, { category: "external", summary: "SUSE Bug 938905 for CVE-2015-4000", url: "https://bugzilla.suse.com/938905", }, { category: "external", summary: "SUSE Bug 938906 for CVE-2015-4000", url: "https://bugzilla.suse.com/938906", }, { category: "external", summary: "SUSE Bug 938913 for CVE-2015-4000", url: "https://bugzilla.suse.com/938913", }, { category: "external", summary: "SUSE Bug 938945 for CVE-2015-4000", url: "https://bugzilla.suse.com/938945", }, { category: "external", summary: "SUSE Bug 943664 for CVE-2015-4000", url: "https://bugzilla.suse.com/943664", }, { category: "external", summary: "SUSE Bug 944729 for CVE-2015-4000", url: "https://bugzilla.suse.com/944729", }, { category: "external", summary: "SUSE Bug 945582 for CVE-2015-4000", url: "https://bugzilla.suse.com/945582", }, { category: "external", summary: "SUSE Bug 955589 for CVE-2015-4000", url: "https://bugzilla.suse.com/955589", }, { category: "external", summary: "SUSE Bug 980406 for CVE-2015-4000", url: "https://bugzilla.suse.com/980406", }, { category: "external", summary: "SUSE Bug 990592 for CVE-2015-4000", url: "https://bugzilla.suse.com/990592", }, { category: "external", summary: "SUSE Bug 994144 for CVE-2015-4000", url: "https://bugzilla.suse.com/994144", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2015-4000", }, { cve: "CVE-2016-4979", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4979", }, ], notes: [ { category: "general", text: "The Apache HTTP Server 2.4.18 through 2.4.20, when mod_http2 and mod_ssl are enabled, does not properly recognize the \"SSLVerifyClient require\" directive for HTTP/2 request authorization, which allows remote attackers to bypass intended access restrictions by leveraging the ability to send multiple requests over a single connection and aborting a renegotiation.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4979", url: "https://www.suse.com/security/cve/CVE-2016-4979", }, { category: "external", summary: "SUSE Bug 987365 for CVE-2016-4979", url: "https://bugzilla.suse.com/987365", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x", "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2016-4979", }, ], }
rhsa-2009_1625
Vulnerability from csaf_redhat
Published
2009-12-07 18:56
Modified
2024-11-22 03:06
Summary
Red Hat Security Advisory: expat security update
Notes
Topic
Updated expat packages that fix two security issues are now available for
Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
Expat is a C library written by James Clark for parsing XML documents.
Two buffer over-read flaws were found in the way Expat handled malformed
UTF-8 sequences when processing XML files. A specially-crafted XML file
could cause applications using Expat to crash while parsing the file.
(CVE-2009-3560, CVE-2009-3720)
All expat users should upgrade to these updated packages, which contain
backported patches to correct these issues. After installing the updated
packages, applications using the Expat library must be restarted for the
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated expat packages that fix two security issues are now available for\nRed Hat Enterprise Linux 3, 4, and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "Expat is a C library written by James Clark for parsing XML documents.\n\nTwo buffer over-read flaws were found in the way Expat handled malformed\nUTF-8 sequences when processing XML files. A specially-crafted XML file\ncould cause applications using Expat to crash while parsing the file.\n(CVE-2009-3560, CVE-2009-3720)\n\nAll expat users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, applications using the Expat library must be restarted for the\nupdate to take effect.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2009:1625", url: "https://access.redhat.com/errata/RHSA-2009:1625", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "531697", url: "https://bugzilla.redhat.com/show_bug.cgi?id=531697", }, { category: "external", summary: "533174", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1625.json", }, ], title: "Red Hat Security Advisory: expat security update", tracking: { current_release_date: "2024-11-22T03:06:38+00:00", generator: { date: "2024-11-22T03:06:38+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2009:1625", initial_release_date: "2009-12-07T18:56:00+00:00", revision_history: [ { date: "2009-12-07T18:56:00+00:00", number: "1", summary: "Initial version", }, { date: "2009-12-07T14:08:01+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T03:06:38+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product: { name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product: { name: "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::client_workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux (v. 5 server)", product: { name: "Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AS version 4", product: { name: "Red Hat Enterprise Linux AS version 4", product_id: "4AS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::as", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop version 4", product: { name: "Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::desktop", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES version 4", product: { name: "Red Hat Enterprise Linux ES version 4", product_id: "4ES", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::es", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux WS version 4", product: { name: "Red Hat Enterprise Linux WS version 4", product_id: "4WS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::ws", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AS version 3", product: { name: "Red Hat Enterprise Linux AS version 3", product_id: "3AS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::as", }, }, }, { category: "product_name", name: "Red Hat Desktop version 3", product: { name: "Red Hat Desktop version 3", product_id: "3Desktop", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::desktop", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES version 3", product: { name: "Red Hat Enterprise Linux ES version 3", product_id: "3ES", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::es", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux WS version 3", product: { name: "Red Hat Enterprise Linux WS version 3", product_id: "3WS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::ws", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.x86_64", product: { name: "expat-0:1.95.8-8.3.el5_4.2.x86_64", product_id: "expat-0:1.95.8-8.3.el5_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.x86_64", product: { name: "expat-0:1.95.7-4.el4_8.2.x86_64", product_id: "expat-0:1.95.7-4.el4_8.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", product_id: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.x86_64", product: { name: "expat-debuginfo-0:1.95.5-6.2.x86_64", product_id: "expat-debuginfo-0:1.95.5-6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.x86_64", product: { name: "expat-devel-0:1.95.5-6.2.x86_64", product_id: "expat-devel-0:1.95.5-6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.x86_64", product: { name: "expat-0:1.95.5-6.2.x86_64", product_id: "expat-0:1.95.5-6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=i386", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=i386", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.i386", product: { name: "expat-0:1.95.8-8.3.el5_4.2.i386", product_id: "expat-0:1.95.8-8.3.el5_4.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=i386", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=i386", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.i386", product: { name: "expat-0:1.95.7-4.el4_8.2.i386", product_id: "expat-0:1.95.7-4.el4_8.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=i386", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.i386", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.i386", product_id: "expat-devel-0:1.95.7-4.el4_8.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=i386", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.i386", product: { name: "expat-debuginfo-0:1.95.5-6.2.i386", product_id: "expat-debuginfo-0:1.95.5-6.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=i386", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.i386", product: { name: "expat-0:1.95.5-6.2.i386", product_id: "expat-0:1.95.5-6.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=i386", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.i386", product: { name: "expat-devel-0:1.95.5-6.2.i386", product_id: "expat-devel-0:1.95.5-6.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.src", product: { name: "expat-0:1.95.8-8.3.el5_4.2.src", product_id: "expat-0:1.95.8-8.3.el5_4.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=src", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.src", product: { name: "expat-0:1.95.7-4.el4_8.2.src", product_id: "expat-0:1.95.7-4.el4_8.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=src", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.src", product: { name: "expat-0:1.95.5-6.2.src", product_id: "expat-0:1.95.5-6.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.ia64", product: { name: "expat-0:1.95.8-8.3.el5_4.2.ia64", product_id: "expat-0:1.95.8-8.3.el5_4.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.ia64", product: { name: "expat-0:1.95.7-4.el4_8.2.ia64", product_id: "expat-0:1.95.7-4.el4_8.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.ia64", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.ia64", product_id: "expat-devel-0:1.95.7-4.el4_8.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.ia64", product: { name: "expat-debuginfo-0:1.95.5-6.2.ia64", product_id: "expat-debuginfo-0:1.95.5-6.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.ia64", product: { name: "expat-devel-0:1.95.5-6.2.ia64", product_id: "expat-devel-0:1.95.5-6.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.ia64", product: { name: "expat-0:1.95.5-6.2.ia64", product_id: "expat-0:1.95.5-6.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.ppc64", product: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc64", product_id: "expat-0:1.95.8-8.3.el5_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.ppc64", product: { name: "expat-0:1.95.7-4.el4_8.2.ppc64", product_id: "expat-0:1.95.7-4.el4_8.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", product_id: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.ppc64", product: { name: "expat-debuginfo-0:1.95.5-6.2.ppc64", product_id: "expat-debuginfo-0:1.95.5-6.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.ppc64", product: { name: "expat-0:1.95.5-6.2.ppc64", product_id: "expat-0:1.95.5-6.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.ppc", product: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc", product_id: "expat-0:1.95.8-8.3.el5_4.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.ppc", product: { name: "expat-0:1.95.7-4.el4_8.2.ppc", product_id: "expat-0:1.95.7-4.el4_8.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.ppc", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc", product_id: "expat-devel-0:1.95.7-4.el4_8.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.ppc", product: { name: "expat-debuginfo-0:1.95.5-6.2.ppc", product_id: "expat-debuginfo-0:1.95.5-6.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.ppc", product: { name: "expat-devel-0:1.95.5-6.2.ppc", product_id: "expat-devel-0:1.95.5-6.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.ppc", product: { name: "expat-0:1.95.5-6.2.ppc", product_id: "expat-0:1.95.5-6.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.s390x", product: { name: "expat-0:1.95.8-8.3.el5_4.2.s390x", product_id: "expat-0:1.95.8-8.3.el5_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.s390x", product: { name: "expat-0:1.95.7-4.el4_8.2.s390x", product_id: "expat-0:1.95.7-4.el4_8.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.s390x", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390x", product_id: "expat-devel-0:1.95.7-4.el4_8.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.s390x", product: { name: "expat-debuginfo-0:1.95.5-6.2.s390x", product_id: "expat-debuginfo-0:1.95.5-6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.s390x", product: { name: "expat-devel-0:1.95.5-6.2.s390x", product_id: "expat-devel-0:1.95.5-6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.s390x", product: { name: "expat-0:1.95.5-6.2.s390x", product_id: "expat-0:1.95.5-6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=s390", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=s390", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.s390", product: { name: "expat-0:1.95.8-8.3.el5_4.2.s390", product_id: "expat-0:1.95.8-8.3.el5_4.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=s390", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=s390", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.s390", product: { name: "expat-0:1.95.7-4.el4_8.2.s390", product_id: "expat-0:1.95.7-4.el4_8.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=s390", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.s390", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390", product_id: "expat-devel-0:1.95.7-4.el4_8.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=s390", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.s390", product: { name: "expat-debuginfo-0:1.95.5-6.2.s390", product_id: "expat-debuginfo-0:1.95.5-6.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=s390", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.s390", product: { name: "expat-0:1.95.5-6.2.s390", product_id: "expat-0:1.95.5-6.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=s390", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.s390", product: { name: "expat-devel-0:1.95.5-6.2.s390", product_id: "expat-devel-0:1.95.5-6.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.i386", }, product_reference: "expat-0:1.95.5-6.2.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.ia64", }, product_reference: "expat-0:1.95.5-6.2.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.ppc", }, product_reference: "expat-0:1.95.5-6.2.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.ppc64", }, product_reference: "expat-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.s390", }, product_reference: "expat-0:1.95.5-6.2.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.s390x", }, product_reference: "expat-0:1.95.5-6.2.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.src as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.src", }, product_reference: "expat-0:1.95.5-6.2.src", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.x86_64", }, product_reference: "expat-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.i386", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.s390", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.i386", }, product_reference: "expat-devel-0:1.95.5-6.2.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.ia64", }, product_reference: "expat-devel-0:1.95.5-6.2.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.ppc", }, product_reference: "expat-devel-0:1.95.5-6.2.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.s390", }, product_reference: "expat-devel-0:1.95.5-6.2.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.s390x", }, product_reference: "expat-devel-0:1.95.5-6.2.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.x86_64", }, product_reference: "expat-devel-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.i386", }, product_reference: "expat-0:1.95.5-6.2.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.ia64", }, product_reference: "expat-0:1.95.5-6.2.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.ppc", }, product_reference: "expat-0:1.95.5-6.2.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.ppc64", }, product_reference: "expat-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.s390", }, product_reference: "expat-0:1.95.5-6.2.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.s390x", }, product_reference: "expat-0:1.95.5-6.2.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.src as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.src", }, product_reference: "expat-0:1.95.5-6.2.src", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.x86_64", }, product_reference: "expat-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.i386", }, product_reference: "expat-devel-0:1.95.5-6.2.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.ia64", }, product_reference: "expat-devel-0:1.95.5-6.2.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.ppc", }, product_reference: "expat-devel-0:1.95.5-6.2.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.s390", }, product_reference: "expat-devel-0:1.95.5-6.2.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.s390x", }, product_reference: "expat-devel-0:1.95.5-6.2.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", }, product_reference: "expat-devel-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.i386", }, product_reference: "expat-0:1.95.5-6.2.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.ia64", }, product_reference: "expat-0:1.95.5-6.2.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.ppc", }, product_reference: "expat-0:1.95.5-6.2.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.ppc64", }, product_reference: "expat-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.s390", }, product_reference: "expat-0:1.95.5-6.2.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.s390x", }, product_reference: "expat-0:1.95.5-6.2.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.src as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.src", }, product_reference: "expat-0:1.95.5-6.2.src", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.x86_64", }, product_reference: "expat-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.i386", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.s390", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.i386", }, product_reference: "expat-devel-0:1.95.5-6.2.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.ia64", }, product_reference: "expat-devel-0:1.95.5-6.2.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.ppc", }, product_reference: "expat-devel-0:1.95.5-6.2.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.s390", }, product_reference: "expat-devel-0:1.95.5-6.2.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.s390x", }, product_reference: "expat-devel-0:1.95.5-6.2.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.x86_64", }, product_reference: "expat-devel-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.i386", }, product_reference: "expat-0:1.95.5-6.2.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.ia64", }, product_reference: "expat-0:1.95.5-6.2.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.ppc", }, product_reference: "expat-0:1.95.5-6.2.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.ppc64", }, product_reference: "expat-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.s390", }, product_reference: "expat-0:1.95.5-6.2.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.s390x", }, product_reference: "expat-0:1.95.5-6.2.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.src as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.src", }, product_reference: "expat-0:1.95.5-6.2.src", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.x86_64", }, product_reference: "expat-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.i386", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.s390", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.i386", }, product_reference: "expat-devel-0:1.95.5-6.2.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.ia64", }, product_reference: "expat-devel-0:1.95.5-6.2.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.ppc", }, product_reference: "expat-devel-0:1.95.5-6.2.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.s390", }, product_reference: "expat-devel-0:1.95.5-6.2.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.s390x", }, product_reference: "expat-devel-0:1.95.5-6.2.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.x86_64", }, product_reference: "expat-devel-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.src", }, product_reference: "expat-0:1.95.7-4.el4_8.2.src", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.src", }, product_reference: "expat-0:1.95.7-4.el4_8.2.src", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.src", }, product_reference: "expat-0:1.95.7-4.el4_8.2.src", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.src", }, product_reference: "expat-0:1.95.7-4.el4_8.2.src", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.src", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.src", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.src", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.src as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.src", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.src", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Server", }, ], }, vulnerabilities: [ { cve: "CVE-2009-3560", discovery_date: "2009-11-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "533174", }, ], notes: [ { category: "description", text: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3560", }, { category: "external", summary: "RHBZ#533174", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3560", url: "https://www.cve.org/CVERecord?id=CVE-2009-3560", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", }, ], release_date: "2009-12-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-12-07T18:56:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1625", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", }, { cve: "CVE-2009-3720", discovery_date: "2009-08-21T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "531697", }, ], notes: [ { category: "description", text: "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3720", }, { category: "external", summary: "RHBZ#531697", url: "https://bugzilla.redhat.com/show_bug.cgi?id=531697", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3720", url: "https://www.cve.org/CVERecord?id=CVE-2009-3720", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", }, ], release_date: "2009-01-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-12-07T18:56:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1625", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", }, ], }
rhsa-2011:0896
Vulnerability from csaf_redhat
Published
2011-06-22 23:14
Modified
2024-11-22 04:47
Summary
Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update
Notes
Topic
JBoss Enterprise Web Server 1.0.2 is now available from the Red Hat
Customer Portal for Red Hat Enterprise Linux 4, 5 and 6, Solaris, and
Microsoft Windows.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
JBoss Enterprise Web Server is a fully-integrated and certified set of
components for hosting Java web applications.
This is the first release of JBoss Enterprise Web Server for Red Hat
Enterprise Linux 6. For Red Hat Enterprise Linux 4 and 5, Solaris, and
Microsoft Windows, this release serves as a replacement for JBoss
Enterprise Web Server 1.0.1, and includes a number of bug fixes. Refer to
the Release Notes, linked in the References, for more information.
This update corrects security flaws in the following components:
tomcat6:
A cross-site scripting (XSS) flaw was found in the Manager application,
used for managing web applications on Apache Tomcat. If a remote attacker
could trick a user who is logged into the Manager application into visiting
a specially-crafted URL, the attacker could perform Manager application
tasks with the privileges of the logged in user. (CVE-2010-4172)
tomcat5 and tomcat6:
It was found that web applications could modify the location of the Apache
Tomcat host's work directory. As web applications deployed on Tomcat have
read and write access to this directory, a malicious web application could
use this flaw to trick Tomcat into giving it read and write access to an
arbitrary directory on the file system. (CVE-2010-3718)
A second cross-site scripting (XSS) flaw was found in the Manager
application. A malicious web application could use this flaw to conduct an
XSS attack, leading to arbitrary web script execution with the privileges
of victims who are logged into and viewing Manager application web pages.
(CVE-2011-0013)
A possible minor information leak was found in the way Apache Tomcat
generated HTTP BASIC and DIGEST authentication requests. For configurations
where a realm name was not specified and Tomcat was accessed via a proxy,
the default generated realm contained the hostname and port used by the
proxy to send requests to the Tomcat server. (CVE-2010-1157)
httpd:
A flaw was found in the way the mod_dav module of the Apache HTTP Server
handled certain requests. If a remote attacker were to send a carefully
crafted request to the server, it could cause the httpd child process to
crash. (CVE-2010-1452)
A flaw was discovered in the way the mod_proxy_http module of the Apache
HTTP Server handled the timeouts of requests forwarded by a reverse proxy
to the back-end server. In some configurations, the proxy could return
a response intended for another user under certain timeout conditions,
possibly leading to information disclosure. Note: This issue only affected
httpd running on the Windows operating system. (CVE-2010-2068)
apr:
It was found that the apr_fnmatch() function used an unconstrained
recursion when processing patterns with the '*' wildcard. An attacker could
use this flaw to cause an application using this function, which also
accepted untrusted input as a pattern for matching (such as an httpd server
using the mod_autoindex module), to exhaust all stack memory or use an
excessive amount of CPU time when performing matching. (CVE-2011-0419)
apr-util:
It was found that certain input could cause the apr-util library to
allocate more memory than intended in the apr_brigade_split_line()
function. An attacker able to provide input in small chunks to an
application using the apr-util library (such as httpd) could possibly use
this flaw to trigger high memory consumption. (CVE-2010-1623)
The following flaws were corrected in the packages for Solaris and Windows.
Updates for Red Hat Enterprise Linux can be downloaded from the Red Hat
Network.
Multiple flaws in OpenSSL, which could possibly cause a crash, code
execution, or a change of session parameters, have been corrected.
(CVE-2009-3245, CVE-2010-4180, CVE-2008-7270)
Two denial of service flaws were corrected in Expat. (CVE-2009-3560,
CVE-2009-3720)
An X.509 certificate verification flaw was corrected in OpenLDAP.
(CVE-2009-3767)
More information about these flaws is available from the CVE links in the
References.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "JBoss Enterprise Web Server 1.0.2 is now available from the Red Hat\nCustomer Portal for Red Hat Enterprise Linux 4, 5 and 6, Solaris, and\nMicrosoft Windows.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", title: "Topic", }, { category: "general", text: "JBoss Enterprise Web Server is a fully-integrated and certified set of\ncomponents for hosting Java web applications.\n\nThis is the first release of JBoss Enterprise Web Server for Red Hat\nEnterprise Linux 6. For Red Hat Enterprise Linux 4 and 5, Solaris, and\nMicrosoft Windows, this release serves as a replacement for JBoss\nEnterprise Web Server 1.0.1, and includes a number of bug fixes. Refer to\nthe Release Notes, linked in the References, for more information.\n\nThis update corrects security flaws in the following components:\n\ntomcat6:\n\nA cross-site scripting (XSS) flaw was found in the Manager application,\nused for managing web applications on Apache Tomcat. If a remote attacker\ncould trick a user who is logged into the Manager application into visiting\na specially-crafted URL, the attacker could perform Manager application\ntasks with the privileges of the logged in user. (CVE-2010-4172)\n\ntomcat5 and tomcat6:\n\nIt was found that web applications could modify the location of the Apache\nTomcat host's work directory. As web applications deployed on Tomcat have\nread and write access to this directory, a malicious web application could\nuse this flaw to trick Tomcat into giving it read and write access to an\narbitrary directory on the file system. (CVE-2010-3718)\n\nA second cross-site scripting (XSS) flaw was found in the Manager\napplication. A malicious web application could use this flaw to conduct an\nXSS attack, leading to arbitrary web script execution with the privileges\nof victims who are logged into and viewing Manager application web pages.\n(CVE-2011-0013)\n\nA possible minor information leak was found in the way Apache Tomcat\ngenerated HTTP BASIC and DIGEST authentication requests. For configurations\nwhere a realm name was not specified and Tomcat was accessed via a proxy,\nthe default generated realm contained the hostname and port used by the\nproxy to send requests to the Tomcat server. (CVE-2010-1157)\n\nhttpd:\n\nA flaw was found in the way the mod_dav module of the Apache HTTP Server\nhandled certain requests. If a remote attacker were to send a carefully\ncrafted request to the server, it could cause the httpd child process to\ncrash. (CVE-2010-1452)\n\nA flaw was discovered in the way the mod_proxy_http module of the Apache\nHTTP Server handled the timeouts of requests forwarded by a reverse proxy\nto the back-end server. In some configurations, the proxy could return\na response intended for another user under certain timeout conditions,\npossibly leading to information disclosure. Note: This issue only affected\nhttpd running on the Windows operating system. (CVE-2010-2068)\n\napr:\n\nIt was found that the apr_fnmatch() function used an unconstrained\nrecursion when processing patterns with the '*' wildcard. An attacker could\nuse this flaw to cause an application using this function, which also\naccepted untrusted input as a pattern for matching (such as an httpd server\nusing the mod_autoindex module), to exhaust all stack memory or use an\nexcessive amount of CPU time when performing matching. (CVE-2011-0419)\n\napr-util:\n\nIt was found that certain input could cause the apr-util library to\nallocate more memory than intended in the apr_brigade_split_line()\nfunction. An attacker able to provide input in small chunks to an\napplication using the apr-util library (such as httpd) could possibly use\nthis flaw to trigger high memory consumption. (CVE-2010-1623)\n\nThe following flaws were corrected in the packages for Solaris and Windows.\nUpdates for Red Hat Enterprise Linux can be downloaded from the Red Hat\nNetwork.\n\nMultiple flaws in OpenSSL, which could possibly cause a crash, code\nexecution, or a change of session parameters, have been corrected.\n(CVE-2009-3245, CVE-2010-4180, CVE-2008-7270)\n\nTwo denial of service flaws were corrected in Expat. (CVE-2009-3560,\nCVE-2009-3720)\n\nAn X.509 certificate verification flaw was corrected in OpenLDAP.\n(CVE-2009-3767)\n\nMore information about these flaws is available from the CVE links in the\nReferences.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2011:0896", url: "https://access.redhat.com/errata/RHSA-2011:0896", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html", url: "http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=webserver&version=1.0.2", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=webserver&version=1.0.2", }, { category: "external", summary: "530715", url: "https://bugzilla.redhat.com/show_bug.cgi?id=530715", }, { category: "external", summary: "531697", url: "https://bugzilla.redhat.com/show_bug.cgi?id=531697", }, { category: "external", summary: "533174", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { category: "external", summary: "570924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=570924", }, { category: "external", summary: "585331", url: "https://bugzilla.redhat.com/show_bug.cgi?id=585331", }, { category: "external", summary: "618189", url: "https://bugzilla.redhat.com/show_bug.cgi?id=618189", }, { category: "external", summary: "632994", url: "https://bugzilla.redhat.com/show_bug.cgi?id=632994", }, { category: "external", summary: "640281", url: "https://bugzilla.redhat.com/show_bug.cgi?id=640281", }, { category: "external", summary: "656246", url: "https://bugzilla.redhat.com/show_bug.cgi?id=656246", }, { category: "external", summary: "659462", url: "https://bugzilla.redhat.com/show_bug.cgi?id=659462", }, { category: "external", summary: "660650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=660650", }, { category: "external", summary: "675786", url: "https://bugzilla.redhat.com/show_bug.cgi?id=675786", }, { category: "external", summary: "675792", url: "https://bugzilla.redhat.com/show_bug.cgi?id=675792", }, { category: "external", summary: "703390", url: "https://bugzilla.redhat.com/show_bug.cgi?id=703390", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0896.json", }, ], title: "Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update", tracking: { current_release_date: "2024-11-22T04:47:58+00:00", generator: { date: "2024-11-22T04:47:58+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2011:0896", initial_release_date: "2011-06-22T23:14:00+00:00", revision_history: [ { date: "2011-06-22T23:14:00+00:00", number: "1", summary: "Initial version", }, { date: "2011-06-22T19:16:28+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T04:47:58+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat JBoss Web Server 1.0", product: { name: "Red Hat JBoss Web Server 1.0", product_id: "Red Hat JBoss Web Server 1.0", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_enterprise_web_server:1.0", }, }, }, ], category: "product_family", name: "Red Hat JBoss Web Server", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2008-7270", discovery_date: "2010-12-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "660650", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.8j, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the use of a disabled cipher via vectors involving sniffing network traffic to discover a session identifier, a different vulnerability than CVE-2010-4180.", title: "Vulnerability description", }, { category: "summary", text: "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-7270", }, { category: "external", summary: "RHBZ#660650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=660650", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-7270", url: "https://www.cve.org/CVERecord?id=CVE-2008-7270", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-7270", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-7270", }, ], release_date: "2010-12-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack", }, { cve: "CVE-2009-3245", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2010-03-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "570924", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.", title: "Vulnerability description", }, { category: "summary", text: "openssl: missing bn_wexpand return value checks", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3245", }, { category: "external", summary: "RHBZ#570924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=570924", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3245", url: "https://www.cve.org/CVERecord?id=CVE-2009-3245", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3245", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3245", }, ], release_date: "2010-02-23T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.6, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:H/Au:N/C:C/I:C/A:C", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl: missing bn_wexpand return value checks", }, { cve: "CVE-2009-3560", discovery_date: "2009-11-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "533174", }, ], notes: [ { category: "description", text: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3560", }, { category: "external", summary: "RHBZ#533174", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3560", url: "https://www.cve.org/CVERecord?id=CVE-2009-3560", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", }, ], release_date: "2009-12-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", }, { cve: "CVE-2009-3720", discovery_date: "2009-08-21T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "531697", }, ], notes: [ { category: "description", text: "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3720", }, { category: "external", summary: "RHBZ#531697", url: "https://bugzilla.redhat.com/show_bug.cgi?id=531697", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3720", url: "https://www.cve.org/CVERecord?id=CVE-2009-3720", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", }, ], release_date: "2009-01-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", }, { cve: "CVE-2009-3767", discovery_date: "2009-08-21T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "530715", }, ], notes: [ { category: "description", text: "libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", title: "Vulnerability description", }, { category: "summary", text: "OpenLDAP: Doesn't properly handle NULL character in subject Common Name", title: "Vulnerability summary", }, { category: "other", text: "This issue was addressed in the openldap packages as shipped with Red Hat Enterprise Linux 5 and 4 via: https://rhn.redhat.com/errata/RHSA-2010-0198.html and https://rhn.redhat.com/errata/RHSA-2010-0543.html respectively.\n\nThe Red Hat Security Response Team has rated this issue as having moderate security impact, a future openldap update may address this flaw in Red Hat Enterprise Linux 3.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3767", }, { category: "external", summary: "RHBZ#530715", url: "https://bugzilla.redhat.com/show_bug.cgi?id=530715", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3767", url: "https://www.cve.org/CVERecord?id=CVE-2009-3767", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3767", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3767", }, ], release_date: "2009-08-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.6, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:N/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenLDAP: Doesn't properly handle NULL character in subject Common Name", }, { cve: "CVE-2010-1157", discovery_date: "2010-04-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "585331", }, ], notes: [ { category: "description", text: "Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.", title: "Vulnerability description", }, { category: "summary", text: "tomcat: information disclosure in authentication headers", title: "Vulnerability summary", }, { category: "other", text: "The risks associated with fixing this flaw are greater than the low severity security risk. We therefore have no plans to fix this flaw. The information leak can be avoided by adjusting the configuration to always specify a realm-name.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-1157", }, { category: "external", summary: "RHBZ#585331", url: "https://bugzilla.redhat.com/show_bug.cgi?id=585331", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-1157", url: "https://www.cve.org/CVERecord?id=CVE-2010-1157", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-1157", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-1157", }, ], release_date: "2010-04-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.6, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:H/Au:N/C:P/I:N/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "tomcat: information disclosure in authentication headers", }, { cve: "CVE-2010-1452", discovery_date: "2010-07-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "618189", }, ], notes: [ { category: "description", text: "The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.", title: "Vulnerability description", }, { category: "summary", text: "mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-1452", }, { category: "external", summary: "RHBZ#618189", url: "https://bugzilla.redhat.com/show_bug.cgi?id=618189", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-1452", url: "https://www.cve.org/CVERecord?id=CVE-2010-1452", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-1452", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-1452", }, ], release_date: "2010-07-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.6, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:H/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments", }, { cve: "CVE-2010-1623", discovery_date: "2010-10-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "640281", }, ], notes: [ { category: "description", text: "Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.", title: "Vulnerability description", }, { category: "summary", text: "apr-util: high memory consumption in apr_brigade_split_line()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-1623", }, { category: "external", summary: "RHBZ#640281", url: "https://bugzilla.redhat.com/show_bug.cgi?id=640281", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-1623", url: "https://www.cve.org/CVERecord?id=CVE-2010-1623", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-1623", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-1623", }, ], release_date: "2010-10-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "apr-util: high memory consumption in apr_brigade_split_line()", }, { cve: "CVE-2010-2068", discovery_date: "2010-09-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "632994", }, ], notes: [ { category: "description", text: "mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.", title: "Vulnerability description", }, { category: "summary", text: "(mod_proxy): Sensitive response disclosure due improper handling of timeouts", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-2068", }, { category: "external", summary: "RHBZ#632994", url: "https://bugzilla.redhat.com/show_bug.cgi?id=632994", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-2068", url: "https://www.cve.org/CVERecord?id=CVE-2010-2068", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-2068", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-2068", }, ], release_date: "2010-06-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "(mod_proxy): Sensitive response disclosure due improper handling of timeouts", }, { cve: "CVE-2010-3718", discovery_date: "2011-02-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "675792", }, ], notes: [ { category: "description", text: "Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.", title: "Vulnerability description", }, { category: "summary", text: "tomcat: file permission bypass flaw", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-3718", }, { category: "external", summary: "RHBZ#675792", url: "https://bugzilla.redhat.com/show_bug.cgi?id=675792", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-3718", url: "https://www.cve.org/CVERecord?id=CVE-2010-3718", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-3718", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-3718", }, ], release_date: "2011-02-05T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "tomcat: file permission bypass flaw", }, { cve: "CVE-2010-4172", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, discovery_date: "2010-11-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "656246", }, ], notes: [ { category: "description", text: "Multiple cross-site scripting (XSS) vulnerabilities in the Manager application in Apache Tomcat 6.0.12 through 6.0.29 and 7.0.0 through 7.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or unspecified input to (3) sessionDetail.jsp or (4) java/org/apache/catalina/manager/JspHelper.java, related to use of untrusted web applications.", title: "Vulnerability description", }, { category: "summary", text: "tomcat: cross-site-scripting vulnerability in the manager application", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-4172", }, { category: "external", summary: "RHBZ#656246", url: "https://bugzilla.redhat.com/show_bug.cgi?id=656246", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-4172", url: "https://www.cve.org/CVERecord?id=CVE-2010-4172", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-4172", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-4172", }, ], release_date: "2010-11-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "tomcat: cross-site-scripting vulnerability in the manager application", }, { cve: "CVE-2010-4180", discovery_date: "2010-12-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "659462", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.", title: "Vulnerability description", }, { category: "summary", text: "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-4180", }, { category: "external", summary: "RHBZ#659462", url: "https://bugzilla.redhat.com/show_bug.cgi?id=659462", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-4180", url: "https://www.cve.org/CVERecord?id=CVE-2010-4180", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-4180", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-4180", }, ], release_date: "2010-12-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack", }, { cve: "CVE-2011-0013", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, discovery_date: "2011-02-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "675786", }, ], notes: [ { category: "description", text: "Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.", title: "Vulnerability description", }, { category: "summary", text: "tomcat: XSS vulnerability in HTML Manager interface", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2011-0013", }, { category: "external", summary: "RHBZ#675786", url: "https://bugzilla.redhat.com/show_bug.cgi?id=675786", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2011-0013", url: "https://www.cve.org/CVERecord?id=CVE-2011-0013", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2011-0013", url: "https://nvd.nist.gov/vuln/detail/CVE-2011-0013", }, ], release_date: "2011-01-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "tomcat: XSS vulnerability in HTML Manager interface", }, { acknowledgments: [ { names: [ "Maksymilian Arciemowicz", ], }, ], cve: "CVE-2011-0419", discovery_date: "2011-05-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "703390", }, ], notes: [ { category: "description", text: "Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.", title: "Vulnerability description", }, { category: "summary", text: "apr: unconstrained recursion in apr_fnmatch", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2011-0419", }, { category: "external", summary: "RHBZ#703390", url: "https://bugzilla.redhat.com/show_bug.cgi?id=703390", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2011-0419", url: "https://www.cve.org/CVERecord?id=CVE-2011-0419", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2011-0419", url: "https://nvd.nist.gov/vuln/detail/CVE-2011-0419", }, ], release_date: "2011-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, { category: "workaround", details: "mod_autoindex can be configured to ignore request query arguments provided by the client by adding IgnoreClient option to the IndexOptions directive:\n\nhttp://httpd.apache.org/docs/2.2/mod/mod_autoindex.html#indexoptions.ignoreclient", product_ids: [ "Red Hat JBoss Web Server 1.0", ], }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "apr: unconstrained recursion in apr_fnmatch", }, { cve: "CVE-2012-4557", discovery_date: "2012-10-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "871685", }, ], notes: [ { category: "description", text: "The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy_ajp worker moved to error state when timeout exceeded", title: "Vulnerability summary", }, { category: "other", text: "This issue did not affect the version of httpd as shipped with Red Hat Enterprise Linux 5.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2012-4557", }, { category: "external", summary: "RHBZ#871685", url: "https://bugzilla.redhat.com/show_bug.cgi?id=871685", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2012-4557", url: "https://www.cve.org/CVERecord?id=CVE-2012-4557", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2012-4557", url: "https://nvd.nist.gov/vuln/detail/CVE-2012-4557", }, ], release_date: "2012-01-04T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.6, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:H/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: mod_proxy_ajp worker moved to error state when timeout exceeded", }, ], }
rhsa-2017:3239
Vulnerability from csaf_redhat
Published
2017-11-16 19:10
Modified
2025-01-09 05:42
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update
Notes
Topic
An update is now available for Red Hat JBoss Enterprise Application Platform.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[Updated 21st November 2017]
Previously, this erratum was marked as a replacement of the JBoss Enterprise Application Platform 6.4.16 Natives. This was incorrect; the erratum is an update, not a replacement. The erratum text has been modified to reflect this.
Details
Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.
This release provides an update to httpd and OpenSSL. The updates are documented in the Release Notes document linked to in the References.
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
This release of JBoss Enterprise Application Platform 6.4.18 Natives serves as an update to the JBoss Enterprise Application Platform 6.4.16 Natives and includes bug fixes which are documented in the Release Notes document linked to in the References.
All users of Red Hat JBoss Enterprise Application Platform 6.4 Natives are advised to upgrade to these updated packages.
Security Fix(es):
* It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)
* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)
* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)
Red Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno Böck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Gaëtan Leurent (Inria) as the original reporters of CVE-2016-2183.
Bug Fix(es):
* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1508880)
* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1508884)
* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1508885)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update is now available for Red Hat JBoss Enterprise Application Platform.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 21st November 2017]\nPreviously, this erratum was marked as a replacement of the JBoss Enterprise Application Platform 6.4.16 Natives. This was incorrect; the erratum is an update, not a replacement. The erratum text has been modified to reflect this.", title: "Topic", }, { category: "general", text: "Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.\n\nThis release provides an update to httpd and OpenSSL. The updates are documented in the Release Notes document linked to in the References.\n\nThe httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nThis release of JBoss Enterprise Application Platform 6.4.18 Natives serves as an update to the JBoss Enterprise Application Platform 6.4.16 Natives and includes bug fixes which are documented in the Release Notes document linked to in the References.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.4 Natives are advised to upgrade to these updated packages.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno Böck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Gaëtan Leurent (Inria) as the original reporters of CVE-2016-2183.\n\nBug Fix(es):\n\n* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1508880)\n\n* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1508884)\n\n* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1508885)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2017:3239", url: "https://access.redhat.com/errata/RHSA-2017:3239", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/", url: "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4", }, { category: "external", summary: "https://access.redhat.com/articles/3229231", url: "https://access.redhat.com/articles/3229231", }, { category: "external", summary: "1369383", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1369383", }, { category: "external", summary: "1470748", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1470748", }, { category: "external", summary: "1490344", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1490344", }, { category: "external", summary: "1508880", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1508880", }, { category: "external", summary: "1508884", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1508884", }, { category: "external", summary: "1508885", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1508885", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3239.json", }, ], title: "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update", tracking: { current_release_date: "2025-01-09T05:42:19+00:00", generator: { date: "2025-01-09T05:42:19+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.5", }, }, id: "RHSA-2017:3239", initial_release_date: "2017-11-16T19:10:21+00:00", revision_history: [ { date: "2017-11-16T19:10:21+00:00", number: "1", summary: "Initial version", }, { date: "2017-11-21T18:05:17+00:00", number: "2", summary: "Last updated version", }, { date: "2025-01-09T05:42:19+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat JBoss Enterprise Application Platform 6.4", product: { name: "Red Hat JBoss Enterprise Application Platform 6.4", product_id: "Red Hat JBoss Enterprise Application Platform 6.4", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_enterprise_application_platform:6.4", }, }, }, ], category: "product_family", name: "Red Hat JBoss Enterprise Application Platform", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2009-3560", discovery_date: "2009-11-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "533174", }, ], notes: [ { category: "description", text: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3560", }, { category: "external", summary: "RHBZ#533174", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3560", url: "https://www.cve.org/CVERecord?id=CVE-2009-3560", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", }, ], release_date: "2009-12-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", }, { cve: "CVE-2009-3720", discovery_date: "2009-08-21T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "531697", }, ], notes: [ { category: "description", text: "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3720", }, { category: "external", summary: "RHBZ#531697", url: "https://bugzilla.redhat.com/show_bug.cgi?id=531697", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3720", url: "https://www.cve.org/CVERecord?id=CVE-2009-3720", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", }, ], release_date: "2009-01-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", }, { cve: "CVE-2012-0876", cwe: { id: "CWE-407", name: "Inefficient Algorithmic Complexity", }, discovery_date: "2012-01-16T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "786617", }, ], notes: [ { category: "description", text: "A denial of service flaw was found in the implementation of hash arrays in Expat. An attacker could use this flaw to make an application using Expat consume an excessive amount of CPU time by providing a specially crafted XML file that triggers multiple hash function collisions. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions.", title: "Vulnerability description", }, { category: "summary", text: "expat: hash table collisions CPU usage DoS", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2012-0876", }, { category: "external", summary: "RHBZ#786617", url: "https://bugzilla.redhat.com/show_bug.cgi?id=786617", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2012-0876", url: "https://www.cve.org/CVERecord?id=CVE-2012-0876", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2012-0876", url: "https://nvd.nist.gov/vuln/detail/CVE-2012-0876", }, ], release_date: "2012-03-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: hash table collisions CPU usage DoS", }, { acknowledgments: [ { names: [ "OpenVPN", ], }, { names: [ "Karthikeyan Bhargavan", "Gaëtan Leurent", ], organization: "Inria", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2016-2183", cwe: { id: "CWE-327", name: "Use of a Broken or Risky Cryptographic Algorithm", }, discovery_date: "2016-08-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1369383", }, ], notes: [ { category: "description", text: "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.", title: "Vulnerability description", }, { category: "summary", text: "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)", title: "Vulnerability summary", }, { category: "other", text: "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2016-2183", }, { category: "external", summary: "RHBZ#1369383", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1369383", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2016-2183", url: "https://www.cve.org/CVERecord?id=CVE-2016-2183", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2016-2183", url: "https://nvd.nist.gov/vuln/detail/CVE-2016-2183", }, { category: "external", summary: "https://access.redhat.com/articles/2548661", url: "https://access.redhat.com/articles/2548661", }, { category: "external", summary: "https://access.redhat.com/errata/RHSA-2016:1940", url: "https://access.redhat.com/errata/RHSA-2016:1940", }, { category: "external", summary: "https://sweet32.info/", url: "https://sweet32.info/", }, ], release_date: "2016-08-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, { category: "workaround", details: "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)", }, { cve: "CVE-2017-9788", cwe: { id: "CWE-456", name: "Missing Initialization of a Variable", }, discovery_date: "2017-07-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1470748", }, ], notes: [ { category: "description", text: "It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Uninitialized memory reflection in mod_auth_digest", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-9788", }, { category: "external", summary: "RHBZ#1470748", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1470748", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-9788", url: "https://www.cve.org/CVERecord?id=CVE-2017-9788", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-9788", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-9788", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34", url: "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27", url: "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27", }, ], release_date: "2017-07-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, { category: "workaround", details: "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "httpd: Uninitialized memory reflection in mod_auth_digest", }, { acknowledgments: [ { names: [ "Hanno Böck", ], }, ], cve: "CVE-2017-9798", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2017-09-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1490344", }, ], notes: [ { category: "description", text: "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-9798", }, { category: "external", summary: "RHBZ#1490344", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1490344", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-9798", url: "https://www.cve.org/CVERecord?id=CVE-2017-9798", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-9798", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-9798", }, { category: "external", summary: "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html", url: "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html", }, ], release_date: "2017-09-18T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, { category: "workaround", details: "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)", }, ], }
RHSA-2017:3239
Vulnerability from csaf_redhat
Published
2017-11-16 19:10
Modified
2025-01-09 05:42
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update
Notes
Topic
An update is now available for Red Hat JBoss Enterprise Application Platform.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[Updated 21st November 2017]
Previously, this erratum was marked as a replacement of the JBoss Enterprise Application Platform 6.4.16 Natives. This was incorrect; the erratum is an update, not a replacement. The erratum text has been modified to reflect this.
Details
Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.
This release provides an update to httpd and OpenSSL. The updates are documented in the Release Notes document linked to in the References.
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
This release of JBoss Enterprise Application Platform 6.4.18 Natives serves as an update to the JBoss Enterprise Application Platform 6.4.16 Natives and includes bug fixes which are documented in the Release Notes document linked to in the References.
All users of Red Hat JBoss Enterprise Application Platform 6.4 Natives are advised to upgrade to these updated packages.
Security Fix(es):
* It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)
* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)
* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)
Red Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno Böck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Gaëtan Leurent (Inria) as the original reporters of CVE-2016-2183.
Bug Fix(es):
* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1508880)
* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1508884)
* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1508885)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update is now available for Red Hat JBoss Enterprise Application Platform.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 21st November 2017]\nPreviously, this erratum was marked as a replacement of the JBoss Enterprise Application Platform 6.4.16 Natives. This was incorrect; the erratum is an update, not a replacement. The erratum text has been modified to reflect this.", title: "Topic", }, { category: "general", text: "Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.\n\nThis release provides an update to httpd and OpenSSL. The updates are documented in the Release Notes document linked to in the References.\n\nThe httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nThis release of JBoss Enterprise Application Platform 6.4.18 Natives serves as an update to the JBoss Enterprise Application Platform 6.4.16 Natives and includes bug fixes which are documented in the Release Notes document linked to in the References.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.4 Natives are advised to upgrade to these updated packages.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno Böck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Gaëtan Leurent (Inria) as the original reporters of CVE-2016-2183.\n\nBug Fix(es):\n\n* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1508880)\n\n* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1508884)\n\n* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1508885)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2017:3239", url: "https://access.redhat.com/errata/RHSA-2017:3239", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/", url: "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4", }, { category: "external", summary: "https://access.redhat.com/articles/3229231", url: "https://access.redhat.com/articles/3229231", }, { category: "external", summary: "1369383", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1369383", }, { category: "external", summary: "1470748", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1470748", }, { category: "external", summary: "1490344", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1490344", }, { category: "external", summary: "1508880", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1508880", }, { category: "external", summary: "1508884", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1508884", }, { category: "external", summary: "1508885", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1508885", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3239.json", }, ], title: "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update", tracking: { current_release_date: "2025-01-09T05:42:19+00:00", generator: { date: "2025-01-09T05:42:19+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.5", }, }, id: "RHSA-2017:3239", initial_release_date: "2017-11-16T19:10:21+00:00", revision_history: [ { date: "2017-11-16T19:10:21+00:00", number: "1", summary: "Initial version", }, { date: "2017-11-21T18:05:17+00:00", number: "2", summary: "Last updated version", }, { date: "2025-01-09T05:42:19+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat JBoss Enterprise Application Platform 6.4", product: { name: "Red Hat JBoss Enterprise Application Platform 6.4", product_id: "Red Hat JBoss Enterprise Application Platform 6.4", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_enterprise_application_platform:6.4", }, }, }, ], category: "product_family", name: "Red Hat JBoss Enterprise Application Platform", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2009-3560", discovery_date: "2009-11-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "533174", }, ], notes: [ { category: "description", text: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3560", }, { category: "external", summary: "RHBZ#533174", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3560", url: "https://www.cve.org/CVERecord?id=CVE-2009-3560", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", }, ], release_date: "2009-12-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", }, { cve: "CVE-2009-3720", discovery_date: "2009-08-21T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "531697", }, ], notes: [ { category: "description", text: "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3720", }, { category: "external", summary: "RHBZ#531697", url: "https://bugzilla.redhat.com/show_bug.cgi?id=531697", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3720", url: "https://www.cve.org/CVERecord?id=CVE-2009-3720", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", }, ], release_date: "2009-01-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", }, { cve: "CVE-2012-0876", cwe: { id: "CWE-407", name: "Inefficient Algorithmic Complexity", }, discovery_date: "2012-01-16T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "786617", }, ], notes: [ { category: "description", text: "A denial of service flaw was found in the implementation of hash arrays in Expat. An attacker could use this flaw to make an application using Expat consume an excessive amount of CPU time by providing a specially crafted XML file that triggers multiple hash function collisions. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions.", title: "Vulnerability description", }, { category: "summary", text: "expat: hash table collisions CPU usage DoS", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2012-0876", }, { category: "external", summary: "RHBZ#786617", url: "https://bugzilla.redhat.com/show_bug.cgi?id=786617", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2012-0876", url: "https://www.cve.org/CVERecord?id=CVE-2012-0876", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2012-0876", url: "https://nvd.nist.gov/vuln/detail/CVE-2012-0876", }, ], release_date: "2012-03-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: hash table collisions CPU usage DoS", }, { acknowledgments: [ { names: [ "OpenVPN", ], }, { names: [ "Karthikeyan Bhargavan", "Gaëtan Leurent", ], organization: "Inria", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2016-2183", cwe: { id: "CWE-327", name: "Use of a Broken or Risky Cryptographic Algorithm", }, discovery_date: "2016-08-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1369383", }, ], notes: [ { category: "description", text: "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.", title: "Vulnerability description", }, { category: "summary", text: "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)", title: "Vulnerability summary", }, { category: "other", text: "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2016-2183", }, { category: "external", summary: "RHBZ#1369383", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1369383", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2016-2183", url: "https://www.cve.org/CVERecord?id=CVE-2016-2183", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2016-2183", url: "https://nvd.nist.gov/vuln/detail/CVE-2016-2183", }, { category: "external", summary: "https://access.redhat.com/articles/2548661", url: "https://access.redhat.com/articles/2548661", }, { category: "external", summary: "https://access.redhat.com/errata/RHSA-2016:1940", url: "https://access.redhat.com/errata/RHSA-2016:1940", }, { category: "external", summary: "https://sweet32.info/", url: "https://sweet32.info/", }, ], release_date: "2016-08-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, { category: "workaround", details: "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)", }, { cve: "CVE-2017-9788", cwe: { id: "CWE-456", name: "Missing Initialization of a Variable", }, discovery_date: "2017-07-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1470748", }, ], notes: [ { category: "description", text: "It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Uninitialized memory reflection in mod_auth_digest", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-9788", }, { category: "external", summary: "RHBZ#1470748", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1470748", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-9788", url: "https://www.cve.org/CVERecord?id=CVE-2017-9788", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-9788", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-9788", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34", url: "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27", url: "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27", }, ], release_date: "2017-07-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, { category: "workaround", details: "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "httpd: Uninitialized memory reflection in mod_auth_digest", }, { acknowledgments: [ { names: [ "Hanno Böck", ], }, ], cve: "CVE-2017-9798", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2017-09-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1490344", }, ], notes: [ { category: "description", text: "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-9798", }, { category: "external", summary: "RHBZ#1490344", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1490344", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-9798", url: "https://www.cve.org/CVERecord?id=CVE-2017-9798", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-9798", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-9798", }, { category: "external", summary: "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html", url: "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html", }, ], release_date: "2017-09-18T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, { category: "workaround", details: "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)", }, ], }
rhsa-2009:1625
Vulnerability from csaf_redhat
Published
2009-12-07 18:56
Modified
2024-11-22 03:06
Summary
Red Hat Security Advisory: expat security update
Notes
Topic
Updated expat packages that fix two security issues are now available for
Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
Expat is a C library written by James Clark for parsing XML documents.
Two buffer over-read flaws were found in the way Expat handled malformed
UTF-8 sequences when processing XML files. A specially-crafted XML file
could cause applications using Expat to crash while parsing the file.
(CVE-2009-3560, CVE-2009-3720)
All expat users should upgrade to these updated packages, which contain
backported patches to correct these issues. After installing the updated
packages, applications using the Expat library must be restarted for the
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated expat packages that fix two security issues are now available for\nRed Hat Enterprise Linux 3, 4, and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "Expat is a C library written by James Clark for parsing XML documents.\n\nTwo buffer over-read flaws were found in the way Expat handled malformed\nUTF-8 sequences when processing XML files. A specially-crafted XML file\ncould cause applications using Expat to crash while parsing the file.\n(CVE-2009-3560, CVE-2009-3720)\n\nAll expat users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, applications using the Expat library must be restarted for the\nupdate to take effect.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2009:1625", url: "https://access.redhat.com/errata/RHSA-2009:1625", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "531697", url: "https://bugzilla.redhat.com/show_bug.cgi?id=531697", }, { category: "external", summary: "533174", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1625.json", }, ], title: "Red Hat Security Advisory: expat security update", tracking: { current_release_date: "2024-11-22T03:06:38+00:00", generator: { date: "2024-11-22T03:06:38+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2009:1625", initial_release_date: "2009-12-07T18:56:00+00:00", revision_history: [ { date: "2009-12-07T18:56:00+00:00", number: "1", summary: "Initial version", }, { date: "2009-12-07T14:08:01+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T03:06:38+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product: { name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product: { name: "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::client_workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux (v. 5 server)", product: { name: "Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AS version 4", product: { name: "Red Hat Enterprise Linux AS version 4", product_id: "4AS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::as", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop version 4", product: { name: "Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::desktop", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES version 4", product: { name: "Red Hat Enterprise Linux ES version 4", product_id: "4ES", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::es", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux WS version 4", product: { name: "Red Hat Enterprise Linux WS version 4", product_id: "4WS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::ws", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AS version 3", product: { name: "Red Hat Enterprise Linux AS version 3", product_id: "3AS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::as", }, }, }, { category: "product_name", name: "Red Hat Desktop version 3", product: { name: "Red Hat Desktop version 3", product_id: "3Desktop", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::desktop", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES version 3", product: { name: "Red Hat Enterprise Linux ES version 3", product_id: "3ES", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::es", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux WS version 3", product: { name: "Red Hat Enterprise Linux WS version 3", product_id: "3WS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::ws", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.x86_64", product: { name: "expat-0:1.95.8-8.3.el5_4.2.x86_64", product_id: "expat-0:1.95.8-8.3.el5_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.x86_64", product: { name: "expat-0:1.95.7-4.el4_8.2.x86_64", product_id: "expat-0:1.95.7-4.el4_8.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", product_id: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.x86_64", product: { name: "expat-debuginfo-0:1.95.5-6.2.x86_64", product_id: "expat-debuginfo-0:1.95.5-6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.x86_64", product: { name: "expat-devel-0:1.95.5-6.2.x86_64", product_id: "expat-devel-0:1.95.5-6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.x86_64", product: { name: "expat-0:1.95.5-6.2.x86_64", product_id: "expat-0:1.95.5-6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=i386", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=i386", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.i386", product: { name: "expat-0:1.95.8-8.3.el5_4.2.i386", product_id: "expat-0:1.95.8-8.3.el5_4.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=i386", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=i386", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.i386", product: { name: "expat-0:1.95.7-4.el4_8.2.i386", product_id: "expat-0:1.95.7-4.el4_8.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=i386", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.i386", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.i386", product_id: "expat-devel-0:1.95.7-4.el4_8.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=i386", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.i386", product: { name: "expat-debuginfo-0:1.95.5-6.2.i386", product_id: "expat-debuginfo-0:1.95.5-6.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=i386", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.i386", product: { name: "expat-0:1.95.5-6.2.i386", product_id: "expat-0:1.95.5-6.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=i386", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.i386", product: { name: "expat-devel-0:1.95.5-6.2.i386", product_id: "expat-devel-0:1.95.5-6.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.src", product: { name: "expat-0:1.95.8-8.3.el5_4.2.src", product_id: "expat-0:1.95.8-8.3.el5_4.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=src", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.src", product: { name: "expat-0:1.95.7-4.el4_8.2.src", product_id: "expat-0:1.95.7-4.el4_8.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=src", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.src", product: { name: "expat-0:1.95.5-6.2.src", product_id: "expat-0:1.95.5-6.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.ia64", product: { name: "expat-0:1.95.8-8.3.el5_4.2.ia64", product_id: "expat-0:1.95.8-8.3.el5_4.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.ia64", product: { name: "expat-0:1.95.7-4.el4_8.2.ia64", product_id: "expat-0:1.95.7-4.el4_8.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.ia64", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.ia64", product_id: "expat-devel-0:1.95.7-4.el4_8.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.ia64", product: { name: "expat-debuginfo-0:1.95.5-6.2.ia64", product_id: "expat-debuginfo-0:1.95.5-6.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.ia64", product: { name: "expat-devel-0:1.95.5-6.2.ia64", product_id: "expat-devel-0:1.95.5-6.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.ia64", product: { name: "expat-0:1.95.5-6.2.ia64", product_id: "expat-0:1.95.5-6.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.ppc64", product: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc64", product_id: "expat-0:1.95.8-8.3.el5_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.ppc64", product: { name: "expat-0:1.95.7-4.el4_8.2.ppc64", product_id: "expat-0:1.95.7-4.el4_8.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", product_id: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.ppc64", product: { name: "expat-debuginfo-0:1.95.5-6.2.ppc64", product_id: "expat-debuginfo-0:1.95.5-6.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.ppc64", product: { name: "expat-0:1.95.5-6.2.ppc64", product_id: "expat-0:1.95.5-6.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.ppc", product: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc", product_id: "expat-0:1.95.8-8.3.el5_4.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.ppc", product: { name: "expat-0:1.95.7-4.el4_8.2.ppc", product_id: "expat-0:1.95.7-4.el4_8.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.ppc", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc", product_id: "expat-devel-0:1.95.7-4.el4_8.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.ppc", product: { name: "expat-debuginfo-0:1.95.5-6.2.ppc", product_id: "expat-debuginfo-0:1.95.5-6.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.ppc", product: { name: "expat-devel-0:1.95.5-6.2.ppc", product_id: "expat-devel-0:1.95.5-6.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.ppc", product: { name: "expat-0:1.95.5-6.2.ppc", product_id: "expat-0:1.95.5-6.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.s390x", product: { name: "expat-0:1.95.8-8.3.el5_4.2.s390x", product_id: "expat-0:1.95.8-8.3.el5_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.s390x", product: { name: "expat-0:1.95.7-4.el4_8.2.s390x", product_id: "expat-0:1.95.7-4.el4_8.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.s390x", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390x", product_id: "expat-devel-0:1.95.7-4.el4_8.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.s390x", product: { name: "expat-debuginfo-0:1.95.5-6.2.s390x", product_id: "expat-debuginfo-0:1.95.5-6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.s390x", product: { name: "expat-devel-0:1.95.5-6.2.s390x", product_id: "expat-devel-0:1.95.5-6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.s390x", product: { name: "expat-0:1.95.5-6.2.s390x", product_id: "expat-0:1.95.5-6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=s390", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=s390", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.s390", product: { name: "expat-0:1.95.8-8.3.el5_4.2.s390", product_id: "expat-0:1.95.8-8.3.el5_4.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=s390", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=s390", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.s390", product: { name: "expat-0:1.95.7-4.el4_8.2.s390", product_id: "expat-0:1.95.7-4.el4_8.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=s390", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.s390", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390", product_id: "expat-devel-0:1.95.7-4.el4_8.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=s390", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.s390", product: { name: "expat-debuginfo-0:1.95.5-6.2.s390", product_id: "expat-debuginfo-0:1.95.5-6.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=s390", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.s390", product: { name: "expat-0:1.95.5-6.2.s390", product_id: "expat-0:1.95.5-6.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=s390", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.s390", product: { name: "expat-devel-0:1.95.5-6.2.s390", product_id: "expat-devel-0:1.95.5-6.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.i386", }, product_reference: "expat-0:1.95.5-6.2.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.ia64", }, product_reference: "expat-0:1.95.5-6.2.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.ppc", }, product_reference: "expat-0:1.95.5-6.2.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.ppc64", }, product_reference: "expat-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.s390", }, product_reference: "expat-0:1.95.5-6.2.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.s390x", }, product_reference: "expat-0:1.95.5-6.2.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.src as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.src", }, product_reference: "expat-0:1.95.5-6.2.src", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.x86_64", }, product_reference: "expat-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.i386", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.s390", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.i386", }, product_reference: "expat-devel-0:1.95.5-6.2.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.ia64", }, product_reference: "expat-devel-0:1.95.5-6.2.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.ppc", }, product_reference: "expat-devel-0:1.95.5-6.2.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.s390", }, product_reference: "expat-devel-0:1.95.5-6.2.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.s390x", }, product_reference: "expat-devel-0:1.95.5-6.2.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.x86_64", }, product_reference: "expat-devel-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.i386", }, product_reference: "expat-0:1.95.5-6.2.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.ia64", }, product_reference: "expat-0:1.95.5-6.2.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.ppc", }, product_reference: "expat-0:1.95.5-6.2.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.ppc64", }, product_reference: "expat-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.s390", }, product_reference: "expat-0:1.95.5-6.2.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.s390x", }, product_reference: "expat-0:1.95.5-6.2.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.src as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.src", }, product_reference: "expat-0:1.95.5-6.2.src", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.x86_64", }, product_reference: "expat-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.i386", }, product_reference: "expat-devel-0:1.95.5-6.2.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.ia64", }, product_reference: "expat-devel-0:1.95.5-6.2.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.ppc", }, product_reference: "expat-devel-0:1.95.5-6.2.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.s390", }, product_reference: "expat-devel-0:1.95.5-6.2.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.s390x", }, product_reference: "expat-devel-0:1.95.5-6.2.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", }, product_reference: "expat-devel-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.i386", }, product_reference: "expat-0:1.95.5-6.2.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.ia64", }, product_reference: "expat-0:1.95.5-6.2.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.ppc", }, product_reference: "expat-0:1.95.5-6.2.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.ppc64", }, product_reference: "expat-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.s390", }, product_reference: "expat-0:1.95.5-6.2.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.s390x", }, product_reference: "expat-0:1.95.5-6.2.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.src as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.src", }, product_reference: "expat-0:1.95.5-6.2.src", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.x86_64", }, product_reference: "expat-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.i386", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.s390", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.i386", }, product_reference: "expat-devel-0:1.95.5-6.2.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.ia64", }, product_reference: "expat-devel-0:1.95.5-6.2.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.ppc", }, product_reference: "expat-devel-0:1.95.5-6.2.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.s390", }, product_reference: "expat-devel-0:1.95.5-6.2.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.s390x", }, product_reference: "expat-devel-0:1.95.5-6.2.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.x86_64", }, product_reference: "expat-devel-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.i386", }, product_reference: "expat-0:1.95.5-6.2.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.ia64", }, product_reference: "expat-0:1.95.5-6.2.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.ppc", }, product_reference: "expat-0:1.95.5-6.2.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.ppc64", }, product_reference: "expat-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.s390", }, product_reference: "expat-0:1.95.5-6.2.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.s390x", }, product_reference: "expat-0:1.95.5-6.2.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.src as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.src", }, product_reference: "expat-0:1.95.5-6.2.src", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.x86_64", }, product_reference: "expat-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.i386", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.s390", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.i386", }, product_reference: "expat-devel-0:1.95.5-6.2.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.ia64", }, product_reference: "expat-devel-0:1.95.5-6.2.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.ppc", }, product_reference: "expat-devel-0:1.95.5-6.2.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.s390", }, product_reference: "expat-devel-0:1.95.5-6.2.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.s390x", }, product_reference: "expat-devel-0:1.95.5-6.2.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.x86_64", }, product_reference: "expat-devel-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.src", }, product_reference: "expat-0:1.95.7-4.el4_8.2.src", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.src", }, product_reference: "expat-0:1.95.7-4.el4_8.2.src", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.src", }, product_reference: "expat-0:1.95.7-4.el4_8.2.src", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.src", }, product_reference: "expat-0:1.95.7-4.el4_8.2.src", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.src", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.src", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.src", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.src as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.src", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.src", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Server", }, ], }, vulnerabilities: [ { cve: "CVE-2009-3560", discovery_date: "2009-11-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "533174", }, ], notes: [ { category: "description", text: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3560", }, { category: "external", summary: "RHBZ#533174", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3560", url: "https://www.cve.org/CVERecord?id=CVE-2009-3560", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", }, ], release_date: "2009-12-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-12-07T18:56:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1625", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", }, { cve: "CVE-2009-3720", discovery_date: "2009-08-21T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "531697", }, ], notes: [ { category: "description", text: "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3720", }, { category: "external", summary: "RHBZ#531697", url: "https://bugzilla.redhat.com/show_bug.cgi?id=531697", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3720", url: "https://www.cve.org/CVERecord?id=CVE-2009-3720", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", }, ], release_date: "2009-01-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-12-07T18:56:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1625", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", }, ], }
rhsa-2011_0896
Vulnerability from csaf_redhat
Published
2011-06-22 23:14
Modified
2024-11-22 04:47
Summary
Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update
Notes
Topic
JBoss Enterprise Web Server 1.0.2 is now available from the Red Hat
Customer Portal for Red Hat Enterprise Linux 4, 5 and 6, Solaris, and
Microsoft Windows.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
JBoss Enterprise Web Server is a fully-integrated and certified set of
components for hosting Java web applications.
This is the first release of JBoss Enterprise Web Server for Red Hat
Enterprise Linux 6. For Red Hat Enterprise Linux 4 and 5, Solaris, and
Microsoft Windows, this release serves as a replacement for JBoss
Enterprise Web Server 1.0.1, and includes a number of bug fixes. Refer to
the Release Notes, linked in the References, for more information.
This update corrects security flaws in the following components:
tomcat6:
A cross-site scripting (XSS) flaw was found in the Manager application,
used for managing web applications on Apache Tomcat. If a remote attacker
could trick a user who is logged into the Manager application into visiting
a specially-crafted URL, the attacker could perform Manager application
tasks with the privileges of the logged in user. (CVE-2010-4172)
tomcat5 and tomcat6:
It was found that web applications could modify the location of the Apache
Tomcat host's work directory. As web applications deployed on Tomcat have
read and write access to this directory, a malicious web application could
use this flaw to trick Tomcat into giving it read and write access to an
arbitrary directory on the file system. (CVE-2010-3718)
A second cross-site scripting (XSS) flaw was found in the Manager
application. A malicious web application could use this flaw to conduct an
XSS attack, leading to arbitrary web script execution with the privileges
of victims who are logged into and viewing Manager application web pages.
(CVE-2011-0013)
A possible minor information leak was found in the way Apache Tomcat
generated HTTP BASIC and DIGEST authentication requests. For configurations
where a realm name was not specified and Tomcat was accessed via a proxy,
the default generated realm contained the hostname and port used by the
proxy to send requests to the Tomcat server. (CVE-2010-1157)
httpd:
A flaw was found in the way the mod_dav module of the Apache HTTP Server
handled certain requests. If a remote attacker were to send a carefully
crafted request to the server, it could cause the httpd child process to
crash. (CVE-2010-1452)
A flaw was discovered in the way the mod_proxy_http module of the Apache
HTTP Server handled the timeouts of requests forwarded by a reverse proxy
to the back-end server. In some configurations, the proxy could return
a response intended for another user under certain timeout conditions,
possibly leading to information disclosure. Note: This issue only affected
httpd running on the Windows operating system. (CVE-2010-2068)
apr:
It was found that the apr_fnmatch() function used an unconstrained
recursion when processing patterns with the '*' wildcard. An attacker could
use this flaw to cause an application using this function, which also
accepted untrusted input as a pattern for matching (such as an httpd server
using the mod_autoindex module), to exhaust all stack memory or use an
excessive amount of CPU time when performing matching. (CVE-2011-0419)
apr-util:
It was found that certain input could cause the apr-util library to
allocate more memory than intended in the apr_brigade_split_line()
function. An attacker able to provide input in small chunks to an
application using the apr-util library (such as httpd) could possibly use
this flaw to trigger high memory consumption. (CVE-2010-1623)
The following flaws were corrected in the packages for Solaris and Windows.
Updates for Red Hat Enterprise Linux can be downloaded from the Red Hat
Network.
Multiple flaws in OpenSSL, which could possibly cause a crash, code
execution, or a change of session parameters, have been corrected.
(CVE-2009-3245, CVE-2010-4180, CVE-2008-7270)
Two denial of service flaws were corrected in Expat. (CVE-2009-3560,
CVE-2009-3720)
An X.509 certificate verification flaw was corrected in OpenLDAP.
(CVE-2009-3767)
More information about these flaws is available from the CVE links in the
References.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "JBoss Enterprise Web Server 1.0.2 is now available from the Red Hat\nCustomer Portal for Red Hat Enterprise Linux 4, 5 and 6, Solaris, and\nMicrosoft Windows.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", title: "Topic", }, { category: "general", text: "JBoss Enterprise Web Server is a fully-integrated and certified set of\ncomponents for hosting Java web applications.\n\nThis is the first release of JBoss Enterprise Web Server for Red Hat\nEnterprise Linux 6. For Red Hat Enterprise Linux 4 and 5, Solaris, and\nMicrosoft Windows, this release serves as a replacement for JBoss\nEnterprise Web Server 1.0.1, and includes a number of bug fixes. Refer to\nthe Release Notes, linked in the References, for more information.\n\nThis update corrects security flaws in the following components:\n\ntomcat6:\n\nA cross-site scripting (XSS) flaw was found in the Manager application,\nused for managing web applications on Apache Tomcat. If a remote attacker\ncould trick a user who is logged into the Manager application into visiting\na specially-crafted URL, the attacker could perform Manager application\ntasks with the privileges of the logged in user. (CVE-2010-4172)\n\ntomcat5 and tomcat6:\n\nIt was found that web applications could modify the location of the Apache\nTomcat host's work directory. As web applications deployed on Tomcat have\nread and write access to this directory, a malicious web application could\nuse this flaw to trick Tomcat into giving it read and write access to an\narbitrary directory on the file system. (CVE-2010-3718)\n\nA second cross-site scripting (XSS) flaw was found in the Manager\napplication. A malicious web application could use this flaw to conduct an\nXSS attack, leading to arbitrary web script execution with the privileges\nof victims who are logged into and viewing Manager application web pages.\n(CVE-2011-0013)\n\nA possible minor information leak was found in the way Apache Tomcat\ngenerated HTTP BASIC and DIGEST authentication requests. For configurations\nwhere a realm name was not specified and Tomcat was accessed via a proxy,\nthe default generated realm contained the hostname and port used by the\nproxy to send requests to the Tomcat server. (CVE-2010-1157)\n\nhttpd:\n\nA flaw was found in the way the mod_dav module of the Apache HTTP Server\nhandled certain requests. If a remote attacker were to send a carefully\ncrafted request to the server, it could cause the httpd child process to\ncrash. (CVE-2010-1452)\n\nA flaw was discovered in the way the mod_proxy_http module of the Apache\nHTTP Server handled the timeouts of requests forwarded by a reverse proxy\nto the back-end server. In some configurations, the proxy could return\na response intended for another user under certain timeout conditions,\npossibly leading to information disclosure. Note: This issue only affected\nhttpd running on the Windows operating system. (CVE-2010-2068)\n\napr:\n\nIt was found that the apr_fnmatch() function used an unconstrained\nrecursion when processing patterns with the '*' wildcard. An attacker could\nuse this flaw to cause an application using this function, which also\naccepted untrusted input as a pattern for matching (such as an httpd server\nusing the mod_autoindex module), to exhaust all stack memory or use an\nexcessive amount of CPU time when performing matching. (CVE-2011-0419)\n\napr-util:\n\nIt was found that certain input could cause the apr-util library to\nallocate more memory than intended in the apr_brigade_split_line()\nfunction. An attacker able to provide input in small chunks to an\napplication using the apr-util library (such as httpd) could possibly use\nthis flaw to trigger high memory consumption. (CVE-2010-1623)\n\nThe following flaws were corrected in the packages for Solaris and Windows.\nUpdates for Red Hat Enterprise Linux can be downloaded from the Red Hat\nNetwork.\n\nMultiple flaws in OpenSSL, which could possibly cause a crash, code\nexecution, or a change of session parameters, have been corrected.\n(CVE-2009-3245, CVE-2010-4180, CVE-2008-7270)\n\nTwo denial of service flaws were corrected in Expat. (CVE-2009-3560,\nCVE-2009-3720)\n\nAn X.509 certificate verification flaw was corrected in OpenLDAP.\n(CVE-2009-3767)\n\nMore information about these flaws is available from the CVE links in the\nReferences.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2011:0896", url: "https://access.redhat.com/errata/RHSA-2011:0896", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html", url: "http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=webserver&version=1.0.2", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=webserver&version=1.0.2", }, { category: "external", summary: "530715", url: "https://bugzilla.redhat.com/show_bug.cgi?id=530715", }, { category: "external", summary: "531697", url: "https://bugzilla.redhat.com/show_bug.cgi?id=531697", }, { category: "external", summary: "533174", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { category: "external", summary: "570924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=570924", }, { category: "external", summary: "585331", url: "https://bugzilla.redhat.com/show_bug.cgi?id=585331", }, { category: "external", summary: "618189", url: "https://bugzilla.redhat.com/show_bug.cgi?id=618189", }, { category: "external", summary: "632994", url: "https://bugzilla.redhat.com/show_bug.cgi?id=632994", }, { category: "external", summary: "640281", url: "https://bugzilla.redhat.com/show_bug.cgi?id=640281", }, { category: "external", summary: "656246", url: "https://bugzilla.redhat.com/show_bug.cgi?id=656246", }, { category: "external", summary: "659462", url: "https://bugzilla.redhat.com/show_bug.cgi?id=659462", }, { category: "external", summary: "660650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=660650", }, { category: "external", summary: "675786", url: "https://bugzilla.redhat.com/show_bug.cgi?id=675786", }, { category: "external", summary: "675792", url: "https://bugzilla.redhat.com/show_bug.cgi?id=675792", }, { category: "external", summary: "703390", url: "https://bugzilla.redhat.com/show_bug.cgi?id=703390", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0896.json", }, ], title: "Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update", tracking: { current_release_date: "2024-11-22T04:47:58+00:00", generator: { date: "2024-11-22T04:47:58+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2011:0896", initial_release_date: "2011-06-22T23:14:00+00:00", revision_history: [ { date: "2011-06-22T23:14:00+00:00", number: "1", summary: "Initial version", }, { date: "2011-06-22T19:16:28+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T04:47:58+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat JBoss Web Server 1.0", product: { name: "Red Hat JBoss Web Server 1.0", product_id: "Red Hat JBoss Web Server 1.0", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_enterprise_web_server:1.0", }, }, }, ], category: "product_family", name: "Red Hat JBoss Web Server", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2008-7270", discovery_date: "2010-12-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "660650", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.8j, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the use of a disabled cipher via vectors involving sniffing network traffic to discover a session identifier, a different vulnerability than CVE-2010-4180.", title: "Vulnerability description", }, { category: "summary", text: "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-7270", }, { category: "external", summary: "RHBZ#660650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=660650", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-7270", url: "https://www.cve.org/CVERecord?id=CVE-2008-7270", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-7270", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-7270", }, ], release_date: "2010-12-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack", }, { cve: "CVE-2009-3245", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2010-03-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "570924", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.", title: "Vulnerability description", }, { category: "summary", text: "openssl: missing bn_wexpand return value checks", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3245", }, { category: "external", summary: "RHBZ#570924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=570924", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3245", url: "https://www.cve.org/CVERecord?id=CVE-2009-3245", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3245", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3245", }, ], release_date: "2010-02-23T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.6, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:H/Au:N/C:C/I:C/A:C", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl: missing bn_wexpand return value checks", }, { cve: "CVE-2009-3560", discovery_date: "2009-11-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "533174", }, ], notes: [ { category: "description", text: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3560", }, { category: "external", summary: "RHBZ#533174", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3560", url: "https://www.cve.org/CVERecord?id=CVE-2009-3560", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", }, ], release_date: "2009-12-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", }, { cve: "CVE-2009-3720", discovery_date: "2009-08-21T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "531697", }, ], notes: [ { category: "description", text: "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3720", }, { category: "external", summary: "RHBZ#531697", url: "https://bugzilla.redhat.com/show_bug.cgi?id=531697", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3720", url: "https://www.cve.org/CVERecord?id=CVE-2009-3720", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", }, ], release_date: "2009-01-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", }, { cve: "CVE-2009-3767", discovery_date: "2009-08-21T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "530715", }, ], notes: [ { category: "description", text: "libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", title: "Vulnerability description", }, { category: "summary", text: "OpenLDAP: Doesn't properly handle NULL character in subject Common Name", title: "Vulnerability summary", }, { category: "other", text: "This issue was addressed in the openldap packages as shipped with Red Hat Enterprise Linux 5 and 4 via: https://rhn.redhat.com/errata/RHSA-2010-0198.html and https://rhn.redhat.com/errata/RHSA-2010-0543.html respectively.\n\nThe Red Hat Security Response Team has rated this issue as having moderate security impact, a future openldap update may address this flaw in Red Hat Enterprise Linux 3.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3767", }, { category: "external", summary: "RHBZ#530715", url: "https://bugzilla.redhat.com/show_bug.cgi?id=530715", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3767", url: "https://www.cve.org/CVERecord?id=CVE-2009-3767", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3767", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3767", }, ], release_date: "2009-08-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.6, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:N/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenLDAP: Doesn't properly handle NULL character in subject Common Name", }, { cve: "CVE-2010-1157", discovery_date: "2010-04-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "585331", }, ], notes: [ { category: "description", text: "Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.", title: "Vulnerability description", }, { category: "summary", text: "tomcat: information disclosure in authentication headers", title: "Vulnerability summary", }, { category: "other", text: "The risks associated with fixing this flaw are greater than the low severity security risk. We therefore have no plans to fix this flaw. The information leak can be avoided by adjusting the configuration to always specify a realm-name.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-1157", }, { category: "external", summary: "RHBZ#585331", url: "https://bugzilla.redhat.com/show_bug.cgi?id=585331", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-1157", url: "https://www.cve.org/CVERecord?id=CVE-2010-1157", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-1157", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-1157", }, ], release_date: "2010-04-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.6, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:H/Au:N/C:P/I:N/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "tomcat: information disclosure in authentication headers", }, { cve: "CVE-2010-1452", discovery_date: "2010-07-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "618189", }, ], notes: [ { category: "description", text: "The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.", title: "Vulnerability description", }, { category: "summary", text: "mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-1452", }, { category: "external", summary: "RHBZ#618189", url: "https://bugzilla.redhat.com/show_bug.cgi?id=618189", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-1452", url: "https://www.cve.org/CVERecord?id=CVE-2010-1452", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-1452", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-1452", }, ], release_date: "2010-07-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.6, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:H/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments", }, { cve: "CVE-2010-1623", discovery_date: "2010-10-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "640281", }, ], notes: [ { category: "description", text: "Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.", title: "Vulnerability description", }, { category: "summary", text: "apr-util: high memory consumption in apr_brigade_split_line()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-1623", }, { category: "external", summary: "RHBZ#640281", url: "https://bugzilla.redhat.com/show_bug.cgi?id=640281", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-1623", url: "https://www.cve.org/CVERecord?id=CVE-2010-1623", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-1623", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-1623", }, ], release_date: "2010-10-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "apr-util: high memory consumption in apr_brigade_split_line()", }, { cve: "CVE-2010-2068", discovery_date: "2010-09-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "632994", }, ], notes: [ { category: "description", text: "mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.", title: "Vulnerability description", }, { category: "summary", text: "(mod_proxy): Sensitive response disclosure due improper handling of timeouts", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-2068", }, { category: "external", summary: "RHBZ#632994", url: "https://bugzilla.redhat.com/show_bug.cgi?id=632994", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-2068", url: "https://www.cve.org/CVERecord?id=CVE-2010-2068", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-2068", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-2068", }, ], release_date: "2010-06-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "(mod_proxy): Sensitive response disclosure due improper handling of timeouts", }, { cve: "CVE-2010-3718", discovery_date: "2011-02-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "675792", }, ], notes: [ { category: "description", text: "Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.", title: "Vulnerability description", }, { category: "summary", text: "tomcat: file permission bypass flaw", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-3718", }, { category: "external", summary: "RHBZ#675792", url: "https://bugzilla.redhat.com/show_bug.cgi?id=675792", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-3718", url: "https://www.cve.org/CVERecord?id=CVE-2010-3718", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-3718", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-3718", }, ], release_date: "2011-02-05T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "tomcat: file permission bypass flaw", }, { cve: "CVE-2010-4172", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, discovery_date: "2010-11-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "656246", }, ], notes: [ { category: "description", text: "Multiple cross-site scripting (XSS) vulnerabilities in the Manager application in Apache Tomcat 6.0.12 through 6.0.29 and 7.0.0 through 7.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or unspecified input to (3) sessionDetail.jsp or (4) java/org/apache/catalina/manager/JspHelper.java, related to use of untrusted web applications.", title: "Vulnerability description", }, { category: "summary", text: "tomcat: cross-site-scripting vulnerability in the manager application", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-4172", }, { category: "external", summary: "RHBZ#656246", url: "https://bugzilla.redhat.com/show_bug.cgi?id=656246", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-4172", url: "https://www.cve.org/CVERecord?id=CVE-2010-4172", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-4172", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-4172", }, ], release_date: "2010-11-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "tomcat: cross-site-scripting vulnerability in the manager application", }, { cve: "CVE-2010-4180", discovery_date: "2010-12-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "659462", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.", title: "Vulnerability description", }, { category: "summary", text: "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-4180", }, { category: "external", summary: "RHBZ#659462", url: "https://bugzilla.redhat.com/show_bug.cgi?id=659462", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-4180", url: "https://www.cve.org/CVERecord?id=CVE-2010-4180", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-4180", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-4180", }, ], release_date: "2010-12-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack", }, { cve: "CVE-2011-0013", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, discovery_date: "2011-02-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "675786", }, ], notes: [ { category: "description", text: "Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.", title: "Vulnerability description", }, { category: "summary", text: "tomcat: XSS vulnerability in HTML Manager interface", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2011-0013", }, { category: "external", summary: "RHBZ#675786", url: "https://bugzilla.redhat.com/show_bug.cgi?id=675786", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2011-0013", url: "https://www.cve.org/CVERecord?id=CVE-2011-0013", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2011-0013", url: "https://nvd.nist.gov/vuln/detail/CVE-2011-0013", }, ], release_date: "2011-01-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "tomcat: XSS vulnerability in HTML Manager interface", }, { acknowledgments: [ { names: [ "Maksymilian Arciemowicz", ], }, ], cve: "CVE-2011-0419", discovery_date: "2011-05-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "703390", }, ], notes: [ { category: "description", text: "Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.", title: "Vulnerability description", }, { category: "summary", text: "apr: unconstrained recursion in apr_fnmatch", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2011-0419", }, { category: "external", summary: "RHBZ#703390", url: "https://bugzilla.redhat.com/show_bug.cgi?id=703390", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2011-0419", url: "https://www.cve.org/CVERecord?id=CVE-2011-0419", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2011-0419", url: "https://nvd.nist.gov/vuln/detail/CVE-2011-0419", }, ], release_date: "2011-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, { category: "workaround", details: "mod_autoindex can be configured to ignore request query arguments provided by the client by adding IgnoreClient option to the IndexOptions directive:\n\nhttp://httpd.apache.org/docs/2.2/mod/mod_autoindex.html#indexoptions.ignoreclient", product_ids: [ "Red Hat JBoss Web Server 1.0", ], }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "apr: unconstrained recursion in apr_fnmatch", }, { cve: "CVE-2012-4557", discovery_date: "2012-10-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "871685", }, ], notes: [ { category: "description", text: "The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy_ajp worker moved to error state when timeout exceeded", title: "Vulnerability summary", }, { category: "other", text: "This issue did not affect the version of httpd as shipped with Red Hat Enterprise Linux 5.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2012-4557", }, { category: "external", summary: "RHBZ#871685", url: "https://bugzilla.redhat.com/show_bug.cgi?id=871685", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2012-4557", url: "https://www.cve.org/CVERecord?id=CVE-2012-4557", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2012-4557", url: "https://nvd.nist.gov/vuln/detail/CVE-2012-4557", }, ], release_date: "2012-01-04T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.6, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:H/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: mod_proxy_ajp worker moved to error state when timeout exceeded", }, ], }
rhsa-2017_3239
Vulnerability from csaf_redhat
Published
2017-11-16 19:10
Modified
2024-11-22 05:16
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update
Notes
Topic
An update is now available for Red Hat JBoss Enterprise Application Platform.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[Updated 21st November 2017]
Previously, this erratum was marked as a replacement of the JBoss Enterprise Application Platform 6.4.16 Natives. This was incorrect; the erratum is an update, not a replacement. The erratum text has been modified to reflect this.
Details
Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.
This release provides an update to httpd and OpenSSL. The updates are documented in the Release Notes document linked to in the References.
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
This release of JBoss Enterprise Application Platform 6.4.18 Natives serves as an update to the JBoss Enterprise Application Platform 6.4.16 Natives and includes bug fixes which are documented in the Release Notes document linked to in the References.
All users of Red Hat JBoss Enterprise Application Platform 6.4 Natives are advised to upgrade to these updated packages.
Security Fix(es):
* It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)
* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)
* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)
Red Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno Böck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Gaëtan Leurent (Inria) as the original reporters of CVE-2016-2183.
Bug Fix(es):
* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1508880)
* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1508884)
* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1508885)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update is now available for Red Hat JBoss Enterprise Application Platform.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 21st November 2017]\nPreviously, this erratum was marked as a replacement of the JBoss Enterprise Application Platform 6.4.16 Natives. This was incorrect; the erratum is an update, not a replacement. The erratum text has been modified to reflect this.", title: "Topic", }, { category: "general", text: "Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.\n\nThis release provides an update to httpd and OpenSSL. The updates are documented in the Release Notes document linked to in the References.\n\nThe httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nThis release of JBoss Enterprise Application Platform 6.4.18 Natives serves as an update to the JBoss Enterprise Application Platform 6.4.16 Natives and includes bug fixes which are documented in the Release Notes document linked to in the References.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.4 Natives are advised to upgrade to these updated packages.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno Böck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Gaëtan Leurent (Inria) as the original reporters of CVE-2016-2183.\n\nBug Fix(es):\n\n* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1508880)\n\n* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1508884)\n\n* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1508885)", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2017:3239", url: "https://access.redhat.com/errata/RHSA-2017:3239", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/", url: "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4", }, { category: "external", summary: "https://access.redhat.com/articles/3229231", url: "https://access.redhat.com/articles/3229231", }, { category: "external", summary: "1369383", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1369383", }, { category: "external", summary: "1470748", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1470748", }, { category: "external", summary: "1490344", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1490344", }, { category: "external", summary: "1508880", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1508880", }, { category: "external", summary: "1508884", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1508884", }, { category: "external", summary: "1508885", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1508885", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3239.json", }, ], title: "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update", tracking: { current_release_date: "2024-11-22T05:16:49+00:00", generator: { date: "2024-11-22T05:16:49+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2017:3239", initial_release_date: "2017-11-16T19:10:21+00:00", revision_history: [ { date: "2017-11-16T19:10:21+00:00", number: "1", summary: "Initial version", }, { date: "2017-11-21T18:05:17+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T05:16:49+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat JBoss Enterprise Application Platform 6.4", product: { name: "Red Hat JBoss Enterprise Application Platform 6.4", product_id: "Red Hat JBoss Enterprise Application Platform 6.4", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_enterprise_application_platform:6.4", }, }, }, ], category: "product_family", name: "Red Hat JBoss Enterprise Application Platform", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2009-3560", discovery_date: "2009-11-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "533174", }, ], notes: [ { category: "description", text: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3560", }, { category: "external", summary: "RHBZ#533174", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3560", url: "https://www.cve.org/CVERecord?id=CVE-2009-3560", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", }, ], release_date: "2009-12-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", }, { cve: "CVE-2009-3720", discovery_date: "2009-08-21T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "531697", }, ], notes: [ { category: "description", text: "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3720", }, { category: "external", summary: "RHBZ#531697", url: "https://bugzilla.redhat.com/show_bug.cgi?id=531697", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3720", url: "https://www.cve.org/CVERecord?id=CVE-2009-3720", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", }, ], release_date: "2009-01-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", }, { cve: "CVE-2012-0876", cwe: { id: "CWE-407", name: "Inefficient Algorithmic Complexity", }, discovery_date: "2012-01-16T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "786617", }, ], notes: [ { category: "description", text: "A denial of service flaw was found in the implementation of hash arrays in Expat. An attacker could use this flaw to make an application using Expat consume an excessive amount of CPU time by providing a specially crafted XML file that triggers multiple hash function collisions. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions.", title: "Vulnerability description", }, { category: "summary", text: "expat: hash table collisions CPU usage DoS", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2012-0876", }, { category: "external", summary: "RHBZ#786617", url: "https://bugzilla.redhat.com/show_bug.cgi?id=786617", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2012-0876", url: "https://www.cve.org/CVERecord?id=CVE-2012-0876", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2012-0876", url: "https://nvd.nist.gov/vuln/detail/CVE-2012-0876", }, ], release_date: "2012-03-03T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: hash table collisions CPU usage DoS", }, { acknowledgments: [ { names: [ "OpenVPN", ], }, { names: [ "Karthikeyan Bhargavan", "Gaëtan Leurent", ], organization: "Inria", summary: "Acknowledged by upstream.", }, ], cve: "CVE-2016-2183", cwe: { id: "CWE-327", name: "Use of a Broken or Risky Cryptographic Algorithm", }, discovery_date: "2016-08-18T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1369383", }, ], notes: [ { category: "description", text: "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.", title: "Vulnerability description", }, { category: "summary", text: "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)", title: "Vulnerability summary", }, { category: "other", text: "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2016-2183", }, { category: "external", summary: "RHBZ#1369383", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1369383", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2016-2183", url: "https://www.cve.org/CVERecord?id=CVE-2016-2183", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2016-2183", url: "https://nvd.nist.gov/vuln/detail/CVE-2016-2183", }, { category: "external", summary: "https://access.redhat.com/articles/2548661", url: "https://access.redhat.com/articles/2548661", }, { category: "external", summary: "https://access.redhat.com/errata/RHSA-2016:1940", url: "https://access.redhat.com/errata/RHSA-2016:1940", }, { category: "external", summary: "https://sweet32.info/", url: "https://sweet32.info/", }, ], release_date: "2016-08-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, { category: "workaround", details: "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, cvss_v3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)", }, { cve: "CVE-2017-9788", cwe: { id: "CWE-456", name: "Missing Initialization of a Variable", }, discovery_date: "2017-07-13T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1470748", }, ], notes: [ { category: "description", text: "It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Uninitialized memory reflection in mod_auth_digest", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-9788", }, { category: "external", summary: "RHBZ#1470748", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1470748", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-9788", url: "https://www.cve.org/CVERecord?id=CVE-2017-9788", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-9788", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-9788", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34", url: "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34", }, { category: "external", summary: "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27", url: "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27", }, ], release_date: "2017-07-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, { category: "workaround", details: "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 4.8, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "httpd: Uninitialized memory reflection in mod_auth_digest", }, { acknowledgments: [ { names: [ "Hanno Böck", ], }, ], cve: "CVE-2017-9798", cwe: { id: "CWE-416", name: "Use After Free", }, discovery_date: "2017-09-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1490344", }, ], notes: [ { category: "description", text: "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.", title: "Vulnerability description", }, { category: "summary", text: "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2017-9798", }, { category: "external", summary: "RHBZ#1490344", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1490344", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2017-9798", url: "https://www.cve.org/CVERecord?id=CVE-2017-9798", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2017-9798", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-9798", }, { category: "external", summary: "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html", url: "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html", }, ], release_date: "2017-09-18T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2017-11-16T19:10:21+00:00", details: "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2017:3239", }, { category: "workaround", details: "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18", product_ids: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "Red Hat JBoss Enterprise Application Platform 6.4", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)", }, ], }
RHSA-2009:1625
Vulnerability from csaf_redhat
Published
2009-12-07 18:56
Modified
2024-11-22 03:06
Summary
Red Hat Security Advisory: expat security update
Notes
Topic
Updated expat packages that fix two security issues are now available for
Red Hat Enterprise Linux 3, 4, and 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
Expat is a C library written by James Clark for parsing XML documents.
Two buffer over-read flaws were found in the way Expat handled malformed
UTF-8 sequences when processing XML files. A specially-crafted XML file
could cause applications using Expat to crash while parsing the file.
(CVE-2009-3560, CVE-2009-3720)
All expat users should upgrade to these updated packages, which contain
backported patches to correct these issues. After installing the updated
packages, applications using the Expat library must be restarted for the
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated expat packages that fix two security issues are now available for\nRed Hat Enterprise Linux 3, 4, and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", title: "Topic", }, { category: "general", text: "Expat is a C library written by James Clark for parsing XML documents.\n\nTwo buffer over-read flaws were found in the way Expat handled malformed\nUTF-8 sequences when processing XML files. A specially-crafted XML file\ncould cause applications using Expat to crash while parsing the file.\n(CVE-2009-3560, CVE-2009-3720)\n\nAll expat users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, applications using the Expat library must be restarted for the\nupdate to take effect.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2009:1625", url: "https://access.redhat.com/errata/RHSA-2009:1625", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "531697", url: "https://bugzilla.redhat.com/show_bug.cgi?id=531697", }, { category: "external", summary: "533174", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1625.json", }, ], title: "Red Hat Security Advisory: expat security update", tracking: { current_release_date: "2024-11-22T03:06:38+00:00", generator: { date: "2024-11-22T03:06:38+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2009:1625", initial_release_date: "2009-12-07T18:56:00+00:00", revision_history: [ { date: "2009-12-07T18:56:00+00:00", number: "1", summary: "Initial version", }, { date: "2009-12-07T14:08:01+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T03:06:38+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product: { name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product: { name: "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::client_workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux (v. 5 server)", product: { name: "Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AS version 4", product: { name: "Red Hat Enterprise Linux AS version 4", product_id: "4AS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::as", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop version 4", product: { name: "Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::desktop", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES version 4", product: { name: "Red Hat Enterprise Linux ES version 4", product_id: "4ES", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::es", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux WS version 4", product: { name: "Red Hat Enterprise Linux WS version 4", product_id: "4WS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:4::ws", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AS version 3", product: { name: "Red Hat Enterprise Linux AS version 3", product_id: "3AS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::as", }, }, }, { category: "product_name", name: "Red Hat Desktop version 3", product: { name: "Red Hat Desktop version 3", product_id: "3Desktop", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::desktop", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES version 3", product: { name: "Red Hat Enterprise Linux ES version 3", product_id: "3ES", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::es", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux WS version 3", product: { name: "Red Hat Enterprise Linux WS version 3", product_id: "3WS", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:3::ws", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.x86_64", product: { name: "expat-0:1.95.8-8.3.el5_4.2.x86_64", product_id: "expat-0:1.95.8-8.3.el5_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.x86_64", product: { name: "expat-0:1.95.7-4.el4_8.2.x86_64", product_id: "expat-0:1.95.7-4.el4_8.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", product_id: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.x86_64", product: { name: "expat-debuginfo-0:1.95.5-6.2.x86_64", product_id: "expat-debuginfo-0:1.95.5-6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.x86_64", product: { name: "expat-devel-0:1.95.5-6.2.x86_64", product_id: "expat-devel-0:1.95.5-6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=x86_64", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.x86_64", product: { name: "expat-0:1.95.5-6.2.x86_64", product_id: "expat-0:1.95.5-6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=i386", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=i386", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.i386", product: { name: "expat-0:1.95.8-8.3.el5_4.2.i386", product_id: "expat-0:1.95.8-8.3.el5_4.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=i386", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=i386", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.i386", product: { name: "expat-0:1.95.7-4.el4_8.2.i386", product_id: "expat-0:1.95.7-4.el4_8.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=i386", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.i386", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.i386", product_id: "expat-devel-0:1.95.7-4.el4_8.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=i386", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.i386", product: { name: "expat-debuginfo-0:1.95.5-6.2.i386", product_id: "expat-debuginfo-0:1.95.5-6.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=i386", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.i386", product: { name: "expat-0:1.95.5-6.2.i386", product_id: "expat-0:1.95.5-6.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=i386", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.i386", product: { name: "expat-devel-0:1.95.5-6.2.i386", product_id: "expat-devel-0:1.95.5-6.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.src", product: { name: "expat-0:1.95.8-8.3.el5_4.2.src", product_id: "expat-0:1.95.8-8.3.el5_4.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=src", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.src", product: { name: "expat-0:1.95.7-4.el4_8.2.src", product_id: "expat-0:1.95.7-4.el4_8.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=src", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.src", product: { name: "expat-0:1.95.5-6.2.src", product_id: "expat-0:1.95.5-6.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.ia64", product: { name: "expat-0:1.95.8-8.3.el5_4.2.ia64", product_id: "expat-0:1.95.8-8.3.el5_4.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.ia64", product: { name: "expat-0:1.95.7-4.el4_8.2.ia64", product_id: "expat-0:1.95.7-4.el4_8.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.ia64", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.ia64", product_id: "expat-devel-0:1.95.7-4.el4_8.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.ia64", product: { name: "expat-debuginfo-0:1.95.5-6.2.ia64", product_id: "expat-debuginfo-0:1.95.5-6.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.ia64", product: { name: "expat-devel-0:1.95.5-6.2.ia64", product_id: "expat-devel-0:1.95.5-6.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=ia64", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.ia64", product: { name: "expat-0:1.95.5-6.2.ia64", product_id: "expat-0:1.95.5-6.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.ppc64", product: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc64", product_id: "expat-0:1.95.8-8.3.el5_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.ppc64", product: { name: "expat-0:1.95.7-4.el4_8.2.ppc64", product_id: "expat-0:1.95.7-4.el4_8.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", product_id: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.ppc64", product: { name: "expat-debuginfo-0:1.95.5-6.2.ppc64", product_id: "expat-debuginfo-0:1.95.5-6.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=ppc64", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.ppc64", product: { name: "expat-0:1.95.5-6.2.ppc64", product_id: "expat-0:1.95.5-6.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.ppc", product: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc", product_id: "expat-0:1.95.8-8.3.el5_4.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.ppc", product: { name: "expat-0:1.95.7-4.el4_8.2.ppc", product_id: "expat-0:1.95.7-4.el4_8.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.ppc", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc", product_id: "expat-devel-0:1.95.7-4.el4_8.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.ppc", product: { name: "expat-debuginfo-0:1.95.5-6.2.ppc", product_id: "expat-debuginfo-0:1.95.5-6.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.ppc", product: { name: "expat-devel-0:1.95.5-6.2.ppc", product_id: "expat-devel-0:1.95.5-6.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=ppc", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.ppc", product: { name: "expat-0:1.95.5-6.2.ppc", product_id: "expat-0:1.95.5-6.2.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.s390x", product: { name: "expat-0:1.95.8-8.3.el5_4.2.s390x", product_id: "expat-0:1.95.8-8.3.el5_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.s390x", product: { name: "expat-0:1.95.7-4.el4_8.2.s390x", product_id: "expat-0:1.95.7-4.el4_8.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.s390x", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390x", product_id: "expat-devel-0:1.95.7-4.el4_8.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.s390x", product: { name: "expat-debuginfo-0:1.95.5-6.2.s390x", product_id: "expat-debuginfo-0:1.95.5-6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.s390x", product: { name: "expat-devel-0:1.95.5-6.2.s390x", product_id: "expat-devel-0:1.95.5-6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=s390x", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.s390x", product: { name: "expat-0:1.95.5-6.2.s390x", product_id: "expat-0:1.95.5-6.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", product: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", product_id: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.8-8.3.el5_4.2?arch=s390", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", product: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", product_id: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.8-8.3.el5_4.2?arch=s390", }, }, }, { category: "product_version", name: "expat-0:1.95.8-8.3.el5_4.2.s390", product: { name: "expat-0:1.95.8-8.3.el5_4.2.s390", product_id: "expat-0:1.95.8-8.3.el5_4.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.8-8.3.el5_4.2?arch=s390", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", product: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", product_id: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.7-4.el4_8.2?arch=s390", }, }, }, { category: "product_version", name: "expat-0:1.95.7-4.el4_8.2.s390", product: { name: "expat-0:1.95.7-4.el4_8.2.s390", product_id: "expat-0:1.95.7-4.el4_8.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.7-4.el4_8.2?arch=s390", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.7-4.el4_8.2.s390", product: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390", product_id: "expat-devel-0:1.95.7-4.el4_8.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.7-4.el4_8.2?arch=s390", }, }, }, { category: "product_version", name: "expat-debuginfo-0:1.95.5-6.2.s390", product: { name: "expat-debuginfo-0:1.95.5-6.2.s390", product_id: "expat-debuginfo-0:1.95.5-6.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-debuginfo@1.95.5-6.2?arch=s390", }, }, }, { category: "product_version", name: "expat-0:1.95.5-6.2.s390", product: { name: "expat-0:1.95.5-6.2.s390", product_id: "expat-0:1.95.5-6.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat@1.95.5-6.2?arch=s390", }, }, }, { category: "product_version", name: "expat-devel-0:1.95.5-6.2.s390", product: { name: "expat-devel-0:1.95.5-6.2.s390", product_id: "expat-devel-0:1.95.5-6.2.s390", product_identification_helper: { purl: "pkg:rpm/redhat/expat-devel@1.95.5-6.2?arch=s390", }, }, }, ], category: "architecture", name: "s390", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.i386", }, product_reference: "expat-0:1.95.5-6.2.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.ia64", }, product_reference: "expat-0:1.95.5-6.2.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.ppc", }, product_reference: "expat-0:1.95.5-6.2.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.ppc64", }, product_reference: "expat-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.s390", }, product_reference: "expat-0:1.95.5-6.2.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.s390x", }, product_reference: "expat-0:1.95.5-6.2.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.src as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.src", }, product_reference: "expat-0:1.95.5-6.2.src", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-0:1.95.5-6.2.x86_64", }, product_reference: "expat-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.i386", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.s390", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.i386", }, product_reference: "expat-devel-0:1.95.5-6.2.i386", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.ia64", }, product_reference: "expat-devel-0:1.95.5-6.2.ia64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.ppc", }, product_reference: "expat-devel-0:1.95.5-6.2.ppc", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.s390", }, product_reference: "expat-devel-0:1.95.5-6.2.s390", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.s390x", }, product_reference: "expat-devel-0:1.95.5-6.2.s390x", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", product_id: "3AS:expat-devel-0:1.95.5-6.2.x86_64", }, product_reference: "expat-devel-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.i386", }, product_reference: "expat-0:1.95.5-6.2.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.ia64", }, product_reference: "expat-0:1.95.5-6.2.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.ppc", }, product_reference: "expat-0:1.95.5-6.2.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.ppc64", }, product_reference: "expat-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.s390", }, product_reference: "expat-0:1.95.5-6.2.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.s390x", }, product_reference: "expat-0:1.95.5-6.2.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.src as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.src", }, product_reference: "expat-0:1.95.5-6.2.src", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-0:1.95.5-6.2.x86_64", }, product_reference: "expat-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.i386 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.i386", }, product_reference: "expat-devel-0:1.95.5-6.2.i386", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ia64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.ia64", }, product_reference: "expat-devel-0:1.95.5-6.2.ia64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ppc as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.ppc", }, product_reference: "expat-devel-0:1.95.5-6.2.ppc", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.s390", }, product_reference: "expat-devel-0:1.95.5-6.2.s390", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390x as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.s390x", }, product_reference: "expat-devel-0:1.95.5-6.2.s390x", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.x86_64 as a component of Red Hat Desktop version 3", product_id: "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", }, product_reference: "expat-devel-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.i386", }, product_reference: "expat-0:1.95.5-6.2.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.ia64", }, product_reference: "expat-0:1.95.5-6.2.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.ppc", }, product_reference: "expat-0:1.95.5-6.2.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.ppc64", }, product_reference: "expat-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.s390", }, product_reference: "expat-0:1.95.5-6.2.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.s390x", }, product_reference: "expat-0:1.95.5-6.2.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.src as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.src", }, product_reference: "expat-0:1.95.5-6.2.src", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-0:1.95.5-6.2.x86_64", }, product_reference: "expat-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.i386", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.s390", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.i386", }, product_reference: "expat-devel-0:1.95.5-6.2.i386", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.ia64", }, product_reference: "expat-devel-0:1.95.5-6.2.ia64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.ppc", }, product_reference: "expat-devel-0:1.95.5-6.2.ppc", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.s390", }, product_reference: "expat-devel-0:1.95.5-6.2.s390", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.s390x", }, product_reference: "expat-devel-0:1.95.5-6.2.s390x", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", product_id: "3ES:expat-devel-0:1.95.5-6.2.x86_64", }, product_reference: "expat-devel-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.i386", }, product_reference: "expat-0:1.95.5-6.2.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.ia64", }, product_reference: "expat-0:1.95.5-6.2.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.ppc", }, product_reference: "expat-0:1.95.5-6.2.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.ppc64", }, product_reference: "expat-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.s390", }, product_reference: "expat-0:1.95.5-6.2.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.s390x", }, product_reference: "expat-0:1.95.5-6.2.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.src as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.src", }, product_reference: "expat-0:1.95.5-6.2.src", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-0:1.95.5-6.2.x86_64", }, product_reference: "expat-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.i386", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.ppc64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.ppc64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.s390", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.i386 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.i386", }, product_reference: "expat-devel-0:1.95.5-6.2.i386", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.ia64", }, product_reference: "expat-devel-0:1.95.5-6.2.ia64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.ppc as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.ppc", }, product_reference: "expat-devel-0:1.95.5-6.2.ppc", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.s390", }, product_reference: "expat-devel-0:1.95.5-6.2.s390", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.s390x as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.s390x", }, product_reference: "expat-devel-0:1.95.5-6.2.s390x", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.5-6.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", product_id: "3WS:expat-devel-0:1.95.5-6.2.x86_64", }, product_reference: "expat-devel-0:1.95.5-6.2.x86_64", relates_to_product_reference: "3WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.src", }, product_reference: "expat-0:1.95.7-4.el4_8.2.src", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", product_id: "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4AS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.src", }, product_reference: "expat-0:1.95.7-4.el4_8.2.src", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", product_id: "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4Desktop", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.src", }, product_reference: "expat-0:1.95.7-4.el4_8.2.src", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", product_id: "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4ES", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.src as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.src", }, product_reference: "expat-0:1.95.7-4.el4_8.2.src", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.i386 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.i386", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ia64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.ppc64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.s390x as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.s390x", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.7-4.el4_8.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", product_id: "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", }, product_reference: "expat-devel-0:1.95.7-4.el4_8.2.x86_64", relates_to_product_reference: "4WS", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.src", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", product_id: "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client-Workstation", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.src", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.src", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Client", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.src as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.src", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.src", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.i386", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ia64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.s390x", relates_to_product_reference: "5Server", }, { category: "default_component_of", full_product_name: { name: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", }, product_reference: "expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", relates_to_product_reference: "5Server", }, ], }, vulnerabilities: [ { cve: "CVE-2009-3560", discovery_date: "2009-11-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "533174", }, ], notes: [ { category: "description", text: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3560", }, { category: "external", summary: "RHBZ#533174", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3560", url: "https://www.cve.org/CVERecord?id=CVE-2009-3560", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", }, ], release_date: "2009-12-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-12-07T18:56:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1625", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", }, { cve: "CVE-2009-3720", discovery_date: "2009-08-21T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "531697", }, ], notes: [ { category: "description", text: "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3720", }, { category: "external", summary: "RHBZ#531697", url: "https://bugzilla.redhat.com/show_bug.cgi?id=531697", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3720", url: "https://www.cve.org/CVERecord?id=CVE-2009-3720", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", }, ], release_date: "2009-01-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2009-12-07T18:56:00+00:00", details: "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", product_ids: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2009:1625", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "3AS:expat-0:1.95.5-6.2.i386", "3AS:expat-0:1.95.5-6.2.ia64", "3AS:expat-0:1.95.5-6.2.ppc", "3AS:expat-0:1.95.5-6.2.ppc64", "3AS:expat-0:1.95.5-6.2.s390", "3AS:expat-0:1.95.5-6.2.s390x", "3AS:expat-0:1.95.5-6.2.src", "3AS:expat-0:1.95.5-6.2.x86_64", "3AS:expat-debuginfo-0:1.95.5-6.2.i386", "3AS:expat-debuginfo-0:1.95.5-6.2.ia64", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc", "3AS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3AS:expat-debuginfo-0:1.95.5-6.2.s390", "3AS:expat-debuginfo-0:1.95.5-6.2.s390x", "3AS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3AS:expat-devel-0:1.95.5-6.2.i386", "3AS:expat-devel-0:1.95.5-6.2.ia64", "3AS:expat-devel-0:1.95.5-6.2.ppc", "3AS:expat-devel-0:1.95.5-6.2.s390", "3AS:expat-devel-0:1.95.5-6.2.s390x", "3AS:expat-devel-0:1.95.5-6.2.x86_64", "3Desktop:expat-0:1.95.5-6.2.i386", "3Desktop:expat-0:1.95.5-6.2.ia64", "3Desktop:expat-0:1.95.5-6.2.ppc", "3Desktop:expat-0:1.95.5-6.2.ppc64", "3Desktop:expat-0:1.95.5-6.2.s390", "3Desktop:expat-0:1.95.5-6.2.s390x", "3Desktop:expat-0:1.95.5-6.2.src", "3Desktop:expat-0:1.95.5-6.2.x86_64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.i386", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ia64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc", "3Desktop:expat-debuginfo-0:1.95.5-6.2.ppc64", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390", "3Desktop:expat-debuginfo-0:1.95.5-6.2.s390x", "3Desktop:expat-debuginfo-0:1.95.5-6.2.x86_64", "3Desktop:expat-devel-0:1.95.5-6.2.i386", "3Desktop:expat-devel-0:1.95.5-6.2.ia64", "3Desktop:expat-devel-0:1.95.5-6.2.ppc", "3Desktop:expat-devel-0:1.95.5-6.2.s390", "3Desktop:expat-devel-0:1.95.5-6.2.s390x", "3Desktop:expat-devel-0:1.95.5-6.2.x86_64", "3ES:expat-0:1.95.5-6.2.i386", "3ES:expat-0:1.95.5-6.2.ia64", "3ES:expat-0:1.95.5-6.2.ppc", "3ES:expat-0:1.95.5-6.2.ppc64", "3ES:expat-0:1.95.5-6.2.s390", "3ES:expat-0:1.95.5-6.2.s390x", "3ES:expat-0:1.95.5-6.2.src", "3ES:expat-0:1.95.5-6.2.x86_64", "3ES:expat-debuginfo-0:1.95.5-6.2.i386", "3ES:expat-debuginfo-0:1.95.5-6.2.ia64", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc", "3ES:expat-debuginfo-0:1.95.5-6.2.ppc64", "3ES:expat-debuginfo-0:1.95.5-6.2.s390", "3ES:expat-debuginfo-0:1.95.5-6.2.s390x", "3ES:expat-debuginfo-0:1.95.5-6.2.x86_64", "3ES:expat-devel-0:1.95.5-6.2.i386", "3ES:expat-devel-0:1.95.5-6.2.ia64", "3ES:expat-devel-0:1.95.5-6.2.ppc", "3ES:expat-devel-0:1.95.5-6.2.s390", "3ES:expat-devel-0:1.95.5-6.2.s390x", "3ES:expat-devel-0:1.95.5-6.2.x86_64", "3WS:expat-0:1.95.5-6.2.i386", "3WS:expat-0:1.95.5-6.2.ia64", "3WS:expat-0:1.95.5-6.2.ppc", "3WS:expat-0:1.95.5-6.2.ppc64", "3WS:expat-0:1.95.5-6.2.s390", "3WS:expat-0:1.95.5-6.2.s390x", "3WS:expat-0:1.95.5-6.2.src", "3WS:expat-0:1.95.5-6.2.x86_64", "3WS:expat-debuginfo-0:1.95.5-6.2.i386", "3WS:expat-debuginfo-0:1.95.5-6.2.ia64", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc", "3WS:expat-debuginfo-0:1.95.5-6.2.ppc64", "3WS:expat-debuginfo-0:1.95.5-6.2.s390", "3WS:expat-debuginfo-0:1.95.5-6.2.s390x", "3WS:expat-debuginfo-0:1.95.5-6.2.x86_64", "3WS:expat-devel-0:1.95.5-6.2.i386", "3WS:expat-devel-0:1.95.5-6.2.ia64", "3WS:expat-devel-0:1.95.5-6.2.ppc", "3WS:expat-devel-0:1.95.5-6.2.s390", "3WS:expat-devel-0:1.95.5-6.2.s390x", "3WS:expat-devel-0:1.95.5-6.2.x86_64", "4AS:expat-0:1.95.7-4.el4_8.2.i386", "4AS:expat-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-0:1.95.7-4.el4_8.2.s390", "4AS:expat-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-0:1.95.7-4.el4_8.2.src", "4AS:expat-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4AS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4AS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4AS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-0:1.95.7-4.el4_8.2.src", "4Desktop:expat-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.i386", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4Desktop:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-0:1.95.7-4.el4_8.2.i386", "4ES:expat-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-0:1.95.7-4.el4_8.2.s390", "4ES:expat-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-0:1.95.7-4.el4_8.2.src", "4ES:expat-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.i386", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4ES:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390", "4ES:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4ES:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-0:1.95.7-4.el4_8.2.i386", "4WS:expat-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-0:1.95.7-4.el4_8.2.s390", "4WS:expat-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-0:1.95.7-4.el4_8.2.src", "4WS:expat-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.i386", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-debuginfo-0:1.95.7-4.el4_8.2.x86_64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.i386", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ia64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc", "4WS:expat-devel-0:1.95.7-4.el4_8.2.ppc64", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390", "4WS:expat-devel-0:1.95.7-4.el4_8.2.s390x", "4WS:expat-devel-0:1.95.7-4.el4_8.2.x86_64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.src", "5Client-Workstation:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client-Workstation:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-0:1.95.8-8.3.el5_4.2.src", "5Client:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Client:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-0:1.95.8-8.3.el5_4.2.src", "5Server:expat-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-debuginfo-0:1.95.8-8.3.el5_4.2.x86_64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.i386", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ia64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.ppc64", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.s390x", "5Server:expat-devel-0:1.95.8-8.3.el5_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", }, ], }
RHSA-2011:0896
Vulnerability from csaf_redhat
Published
2011-06-22 23:14
Modified
2024-11-22 04:47
Summary
Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update
Notes
Topic
JBoss Enterprise Web Server 1.0.2 is now available from the Red Hat
Customer Portal for Red Hat Enterprise Linux 4, 5 and 6, Solaris, and
Microsoft Windows.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
JBoss Enterprise Web Server is a fully-integrated and certified set of
components for hosting Java web applications.
This is the first release of JBoss Enterprise Web Server for Red Hat
Enterprise Linux 6. For Red Hat Enterprise Linux 4 and 5, Solaris, and
Microsoft Windows, this release serves as a replacement for JBoss
Enterprise Web Server 1.0.1, and includes a number of bug fixes. Refer to
the Release Notes, linked in the References, for more information.
This update corrects security flaws in the following components:
tomcat6:
A cross-site scripting (XSS) flaw was found in the Manager application,
used for managing web applications on Apache Tomcat. If a remote attacker
could trick a user who is logged into the Manager application into visiting
a specially-crafted URL, the attacker could perform Manager application
tasks with the privileges of the logged in user. (CVE-2010-4172)
tomcat5 and tomcat6:
It was found that web applications could modify the location of the Apache
Tomcat host's work directory. As web applications deployed on Tomcat have
read and write access to this directory, a malicious web application could
use this flaw to trick Tomcat into giving it read and write access to an
arbitrary directory on the file system. (CVE-2010-3718)
A second cross-site scripting (XSS) flaw was found in the Manager
application. A malicious web application could use this flaw to conduct an
XSS attack, leading to arbitrary web script execution with the privileges
of victims who are logged into and viewing Manager application web pages.
(CVE-2011-0013)
A possible minor information leak was found in the way Apache Tomcat
generated HTTP BASIC and DIGEST authentication requests. For configurations
where a realm name was not specified and Tomcat was accessed via a proxy,
the default generated realm contained the hostname and port used by the
proxy to send requests to the Tomcat server. (CVE-2010-1157)
httpd:
A flaw was found in the way the mod_dav module of the Apache HTTP Server
handled certain requests. If a remote attacker were to send a carefully
crafted request to the server, it could cause the httpd child process to
crash. (CVE-2010-1452)
A flaw was discovered in the way the mod_proxy_http module of the Apache
HTTP Server handled the timeouts of requests forwarded by a reverse proxy
to the back-end server. In some configurations, the proxy could return
a response intended for another user under certain timeout conditions,
possibly leading to information disclosure. Note: This issue only affected
httpd running on the Windows operating system. (CVE-2010-2068)
apr:
It was found that the apr_fnmatch() function used an unconstrained
recursion when processing patterns with the '*' wildcard. An attacker could
use this flaw to cause an application using this function, which also
accepted untrusted input as a pattern for matching (such as an httpd server
using the mod_autoindex module), to exhaust all stack memory or use an
excessive amount of CPU time when performing matching. (CVE-2011-0419)
apr-util:
It was found that certain input could cause the apr-util library to
allocate more memory than intended in the apr_brigade_split_line()
function. An attacker able to provide input in small chunks to an
application using the apr-util library (such as httpd) could possibly use
this flaw to trigger high memory consumption. (CVE-2010-1623)
The following flaws were corrected in the packages for Solaris and Windows.
Updates for Red Hat Enterprise Linux can be downloaded from the Red Hat
Network.
Multiple flaws in OpenSSL, which could possibly cause a crash, code
execution, or a change of session parameters, have been corrected.
(CVE-2009-3245, CVE-2010-4180, CVE-2008-7270)
Two denial of service flaws were corrected in Expat. (CVE-2009-3560,
CVE-2009-3720)
An X.509 certificate verification flaw was corrected in OpenLDAP.
(CVE-2009-3767)
More information about these flaws is available from the CVE links in the
References.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "JBoss Enterprise Web Server 1.0.2 is now available from the Red Hat\nCustomer Portal for Red Hat Enterprise Linux 4, 5 and 6, Solaris, and\nMicrosoft Windows.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", title: "Topic", }, { category: "general", text: "JBoss Enterprise Web Server is a fully-integrated and certified set of\ncomponents for hosting Java web applications.\n\nThis is the first release of JBoss Enterprise Web Server for Red Hat\nEnterprise Linux 6. For Red Hat Enterprise Linux 4 and 5, Solaris, and\nMicrosoft Windows, this release serves as a replacement for JBoss\nEnterprise Web Server 1.0.1, and includes a number of bug fixes. Refer to\nthe Release Notes, linked in the References, for more information.\n\nThis update corrects security flaws in the following components:\n\ntomcat6:\n\nA cross-site scripting (XSS) flaw was found in the Manager application,\nused for managing web applications on Apache Tomcat. If a remote attacker\ncould trick a user who is logged into the Manager application into visiting\na specially-crafted URL, the attacker could perform Manager application\ntasks with the privileges of the logged in user. (CVE-2010-4172)\n\ntomcat5 and tomcat6:\n\nIt was found that web applications could modify the location of the Apache\nTomcat host's work directory. As web applications deployed on Tomcat have\nread and write access to this directory, a malicious web application could\nuse this flaw to trick Tomcat into giving it read and write access to an\narbitrary directory on the file system. (CVE-2010-3718)\n\nA second cross-site scripting (XSS) flaw was found in the Manager\napplication. A malicious web application could use this flaw to conduct an\nXSS attack, leading to arbitrary web script execution with the privileges\nof victims who are logged into and viewing Manager application web pages.\n(CVE-2011-0013)\n\nA possible minor information leak was found in the way Apache Tomcat\ngenerated HTTP BASIC and DIGEST authentication requests. For configurations\nwhere a realm name was not specified and Tomcat was accessed via a proxy,\nthe default generated realm contained the hostname and port used by the\nproxy to send requests to the Tomcat server. (CVE-2010-1157)\n\nhttpd:\n\nA flaw was found in the way the mod_dav module of the Apache HTTP Server\nhandled certain requests. If a remote attacker were to send a carefully\ncrafted request to the server, it could cause the httpd child process to\ncrash. (CVE-2010-1452)\n\nA flaw was discovered in the way the mod_proxy_http module of the Apache\nHTTP Server handled the timeouts of requests forwarded by a reverse proxy\nto the back-end server. In some configurations, the proxy could return\na response intended for another user under certain timeout conditions,\npossibly leading to information disclosure. Note: This issue only affected\nhttpd running on the Windows operating system. (CVE-2010-2068)\n\napr:\n\nIt was found that the apr_fnmatch() function used an unconstrained\nrecursion when processing patterns with the '*' wildcard. An attacker could\nuse this flaw to cause an application using this function, which also\naccepted untrusted input as a pattern for matching (such as an httpd server\nusing the mod_autoindex module), to exhaust all stack memory or use an\nexcessive amount of CPU time when performing matching. (CVE-2011-0419)\n\napr-util:\n\nIt was found that certain input could cause the apr-util library to\nallocate more memory than intended in the apr_brigade_split_line()\nfunction. An attacker able to provide input in small chunks to an\napplication using the apr-util library (such as httpd) could possibly use\nthis flaw to trigger high memory consumption. (CVE-2010-1623)\n\nThe following flaws were corrected in the packages for Solaris and Windows.\nUpdates for Red Hat Enterprise Linux can be downloaded from the Red Hat\nNetwork.\n\nMultiple flaws in OpenSSL, which could possibly cause a crash, code\nexecution, or a change of session parameters, have been corrected.\n(CVE-2009-3245, CVE-2010-4180, CVE-2008-7270)\n\nTwo denial of service flaws were corrected in Expat. (CVE-2009-3560,\nCVE-2009-3720)\n\nAn X.509 certificate verification flaw was corrected in OpenLDAP.\n(CVE-2009-3767)\n\nMore information about these flaws is available from the CVE links in the\nReferences.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2011:0896", url: "https://access.redhat.com/errata/RHSA-2011:0896", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html", url: "http://docs.redhat.com/docs/en-US/JBoss_Enterprise_Web_Server/1.0/html-single/Release_Notes_1.0.2/index.html", }, { category: "external", summary: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=webserver&version=1.0.2", url: "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=webserver&version=1.0.2", }, { category: "external", summary: "530715", url: "https://bugzilla.redhat.com/show_bug.cgi?id=530715", }, { category: "external", summary: "531697", url: "https://bugzilla.redhat.com/show_bug.cgi?id=531697", }, { category: "external", summary: "533174", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { category: "external", summary: "570924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=570924", }, { category: "external", summary: "585331", url: "https://bugzilla.redhat.com/show_bug.cgi?id=585331", }, { category: "external", summary: "618189", url: "https://bugzilla.redhat.com/show_bug.cgi?id=618189", }, { category: "external", summary: "632994", url: "https://bugzilla.redhat.com/show_bug.cgi?id=632994", }, { category: "external", summary: "640281", url: "https://bugzilla.redhat.com/show_bug.cgi?id=640281", }, { category: "external", summary: "656246", url: "https://bugzilla.redhat.com/show_bug.cgi?id=656246", }, { category: "external", summary: "659462", url: "https://bugzilla.redhat.com/show_bug.cgi?id=659462", }, { category: "external", summary: "660650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=660650", }, { category: "external", summary: "675786", url: "https://bugzilla.redhat.com/show_bug.cgi?id=675786", }, { category: "external", summary: "675792", url: "https://bugzilla.redhat.com/show_bug.cgi?id=675792", }, { category: "external", summary: "703390", url: "https://bugzilla.redhat.com/show_bug.cgi?id=703390", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0896.json", }, ], title: "Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update", tracking: { current_release_date: "2024-11-22T04:47:58+00:00", generator: { date: "2024-11-22T04:47:58+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2011:0896", initial_release_date: "2011-06-22T23:14:00+00:00", revision_history: [ { date: "2011-06-22T23:14:00+00:00", number: "1", summary: "Initial version", }, { date: "2011-06-22T19:16:28+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T04:47:58+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat JBoss Web Server 1.0", product: { name: "Red Hat JBoss Web Server 1.0", product_id: "Red Hat JBoss Web Server 1.0", product_identification_helper: { cpe: "cpe:/a:redhat:jboss_enterprise_web_server:1.0", }, }, }, ], category: "product_family", name: "Red Hat JBoss Web Server", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2008-7270", discovery_date: "2010-12-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "660650", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.8j, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the use of a disabled cipher via vectors involving sniffing network traffic to discover a session identifier, a different vulnerability than CVE-2010-4180.", title: "Vulnerability description", }, { category: "summary", text: "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2008-7270", }, { category: "external", summary: "RHBZ#660650", url: "https://bugzilla.redhat.com/show_bug.cgi?id=660650", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2008-7270", url: "https://www.cve.org/CVERecord?id=CVE-2008-7270", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2008-7270", url: "https://nvd.nist.gov/vuln/detail/CVE-2008-7270", }, ], release_date: "2010-12-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG downgrade-to-disabled ciphersuite attack", }, { cve: "CVE-2009-3245", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, discovery_date: "2010-03-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "570924", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.", title: "Vulnerability description", }, { category: "summary", text: "openssl: missing bn_wexpand return value checks", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3245", }, { category: "external", summary: "RHBZ#570924", url: "https://bugzilla.redhat.com/show_bug.cgi?id=570924", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3245", url: "https://www.cve.org/CVERecord?id=CVE-2009-3245", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3245", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3245", }, ], release_date: "2010-02-23T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.6, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:H/Au:N/C:C/I:C/A:C", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "openssl: missing bn_wexpand return value checks", }, { cve: "CVE-2009-3560", discovery_date: "2009-11-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "533174", }, ], notes: [ { category: "description", text: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3560", }, { category: "external", summary: "RHBZ#533174", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3560", url: "https://www.cve.org/CVERecord?id=CVE-2009-3560", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3560", }, ], release_date: "2009-12-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences", }, { cve: "CVE-2009-3720", discovery_date: "2009-08-21T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "531697", }, ], notes: [ { category: "description", text: "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.", title: "Vulnerability description", }, { category: "summary", text: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3720", }, { category: "external", summary: "RHBZ#531697", url: "https://bugzilla.redhat.com/show_bug.cgi?id=531697", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3720", url: "https://www.cve.org/CVERecord?id=CVE-2009-3720", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3720", }, ], release_date: "2009-01-17T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "expat: buffer over-read and crash on XML with malformed UTF-8 sequences", }, { cve: "CVE-2009-3767", discovery_date: "2009-08-21T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "530715", }, ], notes: [ { category: "description", text: "libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other versions, when OpenSSL is used, does not properly handle a '\\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", title: "Vulnerability description", }, { category: "summary", text: "OpenLDAP: Doesn't properly handle NULL character in subject Common Name", title: "Vulnerability summary", }, { category: "other", text: "This issue was addressed in the openldap packages as shipped with Red Hat Enterprise Linux 5 and 4 via: https://rhn.redhat.com/errata/RHSA-2010-0198.html and https://rhn.redhat.com/errata/RHSA-2010-0543.html respectively.\n\nThe Red Hat Security Response Team has rated this issue as having moderate security impact, a future openldap update may address this flaw in Red Hat Enterprise Linux 3.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2009-3767", }, { category: "external", summary: "RHBZ#530715", url: "https://bugzilla.redhat.com/show_bug.cgi?id=530715", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2009-3767", url: "https://www.cve.org/CVERecord?id=CVE-2009-3767", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2009-3767", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-3767", }, ], release_date: "2009-08-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.6, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:N/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "OpenLDAP: Doesn't properly handle NULL character in subject Common Name", }, { cve: "CVE-2010-1157", discovery_date: "2010-04-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "585331", }, ], notes: [ { category: "description", text: "Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.", title: "Vulnerability description", }, { category: "summary", text: "tomcat: information disclosure in authentication headers", title: "Vulnerability summary", }, { category: "other", text: "The risks associated with fixing this flaw are greater than the low severity security risk. We therefore have no plans to fix this flaw. The information leak can be avoided by adjusting the configuration to always specify a realm-name.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-1157", }, { category: "external", summary: "RHBZ#585331", url: "https://bugzilla.redhat.com/show_bug.cgi?id=585331", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-1157", url: "https://www.cve.org/CVERecord?id=CVE-2010-1157", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-1157", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-1157", }, ], release_date: "2010-04-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.6, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:H/Au:N/C:P/I:N/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "tomcat: information disclosure in authentication headers", }, { cve: "CVE-2010-1452", discovery_date: "2010-07-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "618189", }, ], notes: [ { category: "description", text: "The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.", title: "Vulnerability description", }, { category: "summary", text: "mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-1452", }, { category: "external", summary: "RHBZ#618189", url: "https://bugzilla.redhat.com/show_bug.cgi?id=618189", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-1452", url: "https://www.cve.org/CVERecord?id=CVE-2010-1452", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-1452", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-1452", }, ], release_date: "2010-07-21T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.6, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:H/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments", }, { cve: "CVE-2010-1623", discovery_date: "2010-10-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "640281", }, ], notes: [ { category: "description", text: "Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.", title: "Vulnerability description", }, { category: "summary", text: "apr-util: high memory consumption in apr_brigade_split_line()", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-1623", }, { category: "external", summary: "RHBZ#640281", url: "https://bugzilla.redhat.com/show_bug.cgi?id=640281", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-1623", url: "https://www.cve.org/CVERecord?id=CVE-2010-1623", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-1623", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-1623", }, ], release_date: "2010-10-01T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "apr-util: high memory consumption in apr_brigade_split_line()", }, { cve: "CVE-2010-2068", discovery_date: "2010-09-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "632994", }, ], notes: [ { category: "description", text: "mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.", title: "Vulnerability description", }, { category: "summary", text: "(mod_proxy): Sensitive response disclosure due improper handling of timeouts", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-2068", }, { category: "external", summary: "RHBZ#632994", url: "https://bugzilla.redhat.com/show_bug.cgi?id=632994", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-2068", url: "https://www.cve.org/CVERecord?id=CVE-2010-2068", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-2068", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-2068", }, ], release_date: "2010-06-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "(mod_proxy): Sensitive response disclosure due improper handling of timeouts", }, { cve: "CVE-2010-3718", discovery_date: "2011-02-05T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "675792", }, ], notes: [ { category: "description", text: "Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.", title: "Vulnerability description", }, { category: "summary", text: "tomcat: file permission bypass flaw", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-3718", }, { category: "external", summary: "RHBZ#675792", url: "https://bugzilla.redhat.com/show_bug.cgi?id=675792", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-3718", url: "https://www.cve.org/CVERecord?id=CVE-2010-3718", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-3718", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-3718", }, ], release_date: "2011-02-05T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "tomcat: file permission bypass flaw", }, { cve: "CVE-2010-4172", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, discovery_date: "2010-11-22T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "656246", }, ], notes: [ { category: "description", text: "Multiple cross-site scripting (XSS) vulnerabilities in the Manager application in Apache Tomcat 6.0.12 through 6.0.29 and 7.0.0 through 7.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or unspecified input to (3) sessionDetail.jsp or (4) java/org/apache/catalina/manager/JspHelper.java, related to use of untrusted web applications.", title: "Vulnerability description", }, { category: "summary", text: "tomcat: cross-site-scripting vulnerability in the manager application", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-4172", }, { category: "external", summary: "RHBZ#656246", url: "https://bugzilla.redhat.com/show_bug.cgi?id=656246", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-4172", url: "https://www.cve.org/CVERecord?id=CVE-2010-4172", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-4172", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-4172", }, ], release_date: "2010-11-22T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "tomcat: cross-site-scripting vulnerability in the manager application", }, { cve: "CVE-2010-4180", discovery_date: "2010-12-02T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "659462", }, ], notes: [ { category: "description", text: "OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.", title: "Vulnerability description", }, { category: "summary", text: "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2010-4180", }, { category: "external", summary: "RHBZ#659462", url: "https://bugzilla.redhat.com/show_bug.cgi?id=659462", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2010-4180", url: "https://www.cve.org/CVERecord?id=CVE-2010-4180", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2010-4180", url: "https://nvd.nist.gov/vuln/detail/CVE-2010-4180", }, ], release_date: "2010-12-02T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "openssl: NETSCAPE_REUSE_CIPHER_CHANGE_BUG ciphersuite downgrade attack", }, { cve: "CVE-2011-0013", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, discovery_date: "2011-02-04T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "675786", }, ], notes: [ { category: "description", text: "Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.", title: "Vulnerability description", }, { category: "summary", text: "tomcat: XSS vulnerability in HTML Manager interface", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2011-0013", }, { category: "external", summary: "RHBZ#675786", url: "https://bugzilla.redhat.com/show_bug.cgi?id=675786", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2011-0013", url: "https://www.cve.org/CVERecord?id=CVE-2011-0013", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2011-0013", url: "https://nvd.nist.gov/vuln/detail/CVE-2011-0013", }, ], release_date: "2011-01-11T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "tomcat: XSS vulnerability in HTML Manager interface", }, { acknowledgments: [ { names: [ "Maksymilian Arciemowicz", ], }, ], cve: "CVE-2011-0419", discovery_date: "2011-05-10T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "703390", }, ], notes: [ { category: "description", text: "Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.", title: "Vulnerability description", }, { category: "summary", text: "apr: unconstrained recursion in apr_fnmatch", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2011-0419", }, { category: "external", summary: "RHBZ#703390", url: "https://bugzilla.redhat.com/show_bug.cgi?id=703390", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2011-0419", url: "https://www.cve.org/CVERecord?id=CVE-2011-0419", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2011-0419", url: "https://nvd.nist.gov/vuln/detail/CVE-2011-0419", }, ], release_date: "2011-05-10T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, { category: "workaround", details: "mod_autoindex can be configured to ignore request query arguments provided by the client by adding IgnoreClient option to the IndexOptions directive:\n\nhttp://httpd.apache.org/docs/2.2/mod/mod_autoindex.html#indexoptions.ignoreclient", product_ids: [ "Red Hat JBoss Web Server 1.0", ], }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "apr: unconstrained recursion in apr_fnmatch", }, { cve: "CVE-2012-4557", discovery_date: "2012-10-11T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "871685", }, ], notes: [ { category: "description", text: "The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.", title: "Vulnerability description", }, { category: "summary", text: "httpd: mod_proxy_ajp worker moved to error state when timeout exceeded", title: "Vulnerability summary", }, { category: "other", text: "This issue did not affect the version of httpd as shipped with Red Hat Enterprise Linux 5.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "Red Hat JBoss Web Server 1.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2012-4557", }, { category: "external", summary: "RHBZ#871685", url: "https://bugzilla.redhat.com/show_bug.cgi?id=871685", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2012-4557", url: "https://www.cve.org/CVERecord?id=CVE-2012-4557", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2012-4557", url: "https://nvd.nist.gov/vuln/detail/CVE-2012-4557", }, ], release_date: "2012-01-04T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2011-06-22T23:14:00+00:00", details: "All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Enterprise Web Server\n1.0.2, which corrects these issues.\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before installing the update, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). Apache Tomcat and the Apache HTTP\nServer must be restarted for the update to take effect.", product_ids: [ "Red Hat JBoss Web Server 1.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2011:0896", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.6, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:H/Au:N/C:N/I:N/A:P", version: "2.0", }, products: [ "Red Hat JBoss Web Server 1.0", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "httpd: mod_proxy_ajp worker moved to error state when timeout exceeded", }, ], }
fkie_cve-2009-3560
Vulnerability from fkie_nvd
Published
2009-12-04 21:30
Modified
2024-11-21 01:07
Severity ?
Summary
The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libexpat_project | libexpat | 2.0.1 | |
xmltwig | xml-twig_for_perl | * | |
apache | http_server | * | |
apache | http_server | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:libexpat_project:libexpat:2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D7036CC4-4CF6-4D3F-B5B4-09D879A55F8E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:xmltwig:xml-twig_for_perl:*:*:*:*:*:*:*:*", matchCriteriaId: "0AA9A0F6-206B-4441-AFBC-1E6F00F40B9B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", matchCriteriaId: "838655CB-43E7-4BDA-A80C-2314C9870717", versionEndExcluding: "2.0.64", versionStartIncluding: "2.0.35", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", matchCriteriaId: "91F58140-8FBA-4733-9E2B-493BC9E5B284", versionEndExcluding: "2.2.17", versionStartIncluding: "2.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", }, { lang: "es", value: "La función big2_toUt8 en lib/xmltok.c en libexpat de Expat v2.0.1, como el usado en el módulo XML-Twig para Perl, permite a los atacantes dependientes del contexto provocar una denegación de servicio (caída de aplicación) mediante un documento XML con secuencias UTF-8 malformadas que disparan un desbordamiento de lectura de búfer, relacionado con la función doProlog en lib/xmlparse.c, siendo una vulnerabilidad diferente a CVE-2009-2625 y CVE-2009-3720.", }, ], id: "CVE-2009-3560", lastModified: "2024-11-21T01:07:40.360", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2009-12-04T21:30:00.500", references: [ { source: "secalert@redhat.com", tags: [ "Permissions Required", ], url: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.165", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?view=log#rev1.165", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://lists.vmware.com/pipermail/security-announce/2010/000082.html", }, { source: "secalert@redhat.com", tags: [ "Exploit", ], url: "http://mail.python.org/pipermail/expat-bugs/2009-November/002846.html", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=130168502603566&w=2", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/37537", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/38231", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/38794", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/38832", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/38834", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/39478", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/41701", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/43300", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-273630-1", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2009/dsa-1953", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:316", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://www.redhat.com/support/errata/RHSA-2011-0896.html", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/37203", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id?1023278", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.ubuntu.com/usn/USN-890-1", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-890-6", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://www.vupen.com/english/advisories/2010/0528", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://www.vupen.com/english/advisories/2010/0896", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://www.vupen.com/english/advisories/2010/1107", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "http://www.vupen.com/english/advisories/2011/0359", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Patch", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10613", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12942", }, { source: "secalert@redhat.com", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6883", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00370.html", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00394.html", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00413.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", ], url: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.165", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?view=log#rev1.165", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://lists.vmware.com/pipermail/security-announce/2010/000082.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://mail.python.org/pipermail/expat-bugs/2009-November/002846.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=130168502603566&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/37537", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/38231", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/38794", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/38832", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/38834", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/39478", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/41701", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/43300", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-273630-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2009/dsa-1953", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:316", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.redhat.com/support/errata/RHSA-2011-0896.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/37203", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id?1023278", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.ubuntu.com/usn/USN-890-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-890-6", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.vupen.com/english/advisories/2010/0528", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.vupen.com/english/advisories/2010/0896", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.vupen.com/english/advisories/2010/1107", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.vupen.com/english/advisories/2011/0359", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Patch", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10613", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12942", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6883", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00370.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00394.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00413.html", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
gsd-2009-3560
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
Aliases
Aliases
{ GSD: { alias: "CVE-2009-3560", description: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", id: "GSD-2009-3560", references: [ "https://www.suse.com/security/cve/CVE-2009-3560.html", "https://www.debian.org/security/2010/dsa-1977", "https://www.debian.org/security/2009/dsa-1953", "https://access.redhat.com/errata/RHSA-2017:3239", "https://access.redhat.com/errata/RHSA-2011:0896", "https://access.redhat.com/errata/RHSA-2009:1625", "https://linux.oracle.com/cve/CVE-2009-3560.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2009-3560", ], details: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", id: "GSD-2009-3560", modified: "2023-12-13T01:19:50.017020Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2009-3560", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.165", refsource: "CONFIRM", url: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.165", }, { name: "SSA:2011-041-02", refsource: "SLACKWARE", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026", }, { name: "FEDORA-2009-12690", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00370.html", }, { name: "38832", refsource: "SECUNIA", url: "http://secunia.com/advisories/38832", }, { name: "1023278", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1023278", }, { name: "USN-890-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-890-1", }, { name: "38794", refsource: "SECUNIA", url: "http://secunia.com/advisories/38794", }, { name: "[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates", refsource: "MLIST", url: "http://lists.vmware.com/pipermail/security-announce/2010/000082.html", }, { name: "ADV-2010-1107", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2010/1107", }, { name: "DSA-1953", refsource: "DEBIAN", url: "http://www.debian.org/security/2009/dsa-1953", }, { name: "41701", refsource: "SECUNIA", url: "http://secunia.com/advisories/41701", }, { name: "SUSE-SR:2010:011", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html", }, { name: "oval:org.mitre.oval:def:6883", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6883", }, { name: "oval:org.mitre.oval:def:12942", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12942", }, { name: "SUSE-SR:2010:013", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html", }, { name: "[expat-bugs] 20091108 [ expat-Bugs-2894085 ] expat: buffer over-read and crash in big2_toUtf8()", refsource: "MLIST", url: "http://mail.python.org/pipermail/expat-bugs/2009-November/002846.html", }, { name: "SUSE-SR:2010:001", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html", }, { name: "37203", refsource: "BID", url: "http://www.securityfocus.com/bid/37203", }, { name: "USN-890-6", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-890-6", }, { name: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?view=log#rev1.165", refsource: "CONFIRM", url: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?view=log#rev1.165", }, { name: "FEDORA-2009-12737", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00413.html", }, { name: "38231", refsource: "SECUNIA", url: "http://secunia.com/advisories/38231", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { name: "SUSE-SR:2010:012", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html", }, { name: "38834", refsource: "SECUNIA", url: "http://secunia.com/advisories/38834", }, { name: "39478", refsource: "SECUNIA", url: "http://secunia.com/advisories/39478", }, { name: "FEDORA-2009-12716", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00394.html", }, { name: "SUSE-SR:2010:014", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", }, { name: "oval:org.mitre.oval:def:10613", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10613", }, { name: "37537", refsource: "SECUNIA", url: "http://secunia.com/advisories/37537", }, { name: "43300", refsource: "SECUNIA", url: "http://secunia.com/advisories/43300", }, { name: "RHSA-2011:0896", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2011-0896.html", }, { name: "ADV-2010-0896", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2010/0896", }, { name: "273630", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-273630-1", }, { name: "HPSBUX02645", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=130168502603566&w=2", }, { name: "ADV-2011-0359", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2011/0359", }, { name: "MDVSA-2009:316", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:316", }, { name: "ADV-2010-0528", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2010/0528", }, { name: "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:libexpat_project:libexpat:2.0.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:xmltwig:xml-twig_for_perl:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.0.64", versionStartIncluding: "2.0.35", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.2.17", versionStartIncluding: "2.2.0", vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2009-3560", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-119", }, ], }, ], }, references: { reference_data: [ { name: "273630", refsource: "SUNALERT", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-273630-1", }, { name: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.165", refsource: "CONFIRM", tags: [ "Permissions Required", ], url: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.164&r2=1.165", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", refsource: "CONFIRM", tags: [ "Issue Tracking", "Patch", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=533174", }, { name: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?view=log#rev1.165", refsource: "CONFIRM", tags: [ "Broken Link", ], url: "http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?view=log#rev1.165", }, { name: "37203", refsource: "BID", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/37203", }, { name: "[expat-bugs] 20091108 [ expat-Bugs-2894085 ] expat: buffer over-read and crash in big2_toUtf8()", refsource: "MLIST", tags: [ "Exploit", ], url: "http://mail.python.org/pipermail/expat-bugs/2009-November/002846.html", }, { name: "37537", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/37537", }, { name: "1023278", refsource: "SECTRACK", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id?1023278", }, { name: "MDVSA-2009:316", refsource: "MANDRIVA", tags: [ "Broken Link", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:316", }, { name: "FEDORA-2009-12716", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00394.html", }, { name: "FEDORA-2009-12737", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00413.html", }, { name: "FEDORA-2009-12690", refsource: "FEDORA", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00370.html", }, { name: "DSA-1953", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "http://www.debian.org/security/2009/dsa-1953", }, { name: "SUSE-SR:2010:001", refsource: "SUSE", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00007.html", }, { name: "USN-890-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.ubuntu.com/usn/USN-890-1", }, { name: "38231", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/38231", }, { name: "38834", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/38834", }, { name: "[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates", refsource: "MLIST", tags: [ "Broken Link", ], url: "http://lists.vmware.com/pipermail/security-announce/2010/000082.html", }, { name: "38794", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/38794", }, { name: "38832", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/38832", }, { name: "ADV-2010-0528", refsource: "VUPEN", tags: [ "Broken Link", ], url: "http://www.vupen.com/english/advisories/2010/0528", }, { name: "USN-890-6", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "http://www.ubuntu.com/usn/USN-890-6", }, { name: "39478", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/39478", }, { name: "ADV-2010-0896", refsource: "VUPEN", tags: [ "Broken Link", ], url: "http://www.vupen.com/english/advisories/2010/0896", }, { name: "SUSE-SR:2010:011", refsource: "SUSE", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html", }, { name: "ADV-2010-1107", refsource: "VUPEN", tags: [ "Broken Link", ], url: "http://www.vupen.com/english/advisories/2010/1107", }, { name: "SUSE-SR:2010:012", refsource: "SUSE", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html", }, { name: "SUSE-SR:2010:013", refsource: "SUSE", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html", }, { name: "SUSE-SR:2010:014", refsource: "SUSE", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", }, { name: "41701", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/41701", }, { name: "SSA:2011-041-02", refsource: "SLACKWARE", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026", }, { name: "ADV-2011-0359", refsource: "VUPEN", tags: [ "Broken Link", ], url: "http://www.vupen.com/english/advisories/2011/0359", }, { name: "43300", refsource: "SECUNIA", tags: [ "Broken Link", ], url: "http://secunia.com/advisories/43300", }, { name: "RHSA-2011:0896", refsource: "REDHAT", tags: [ "Broken Link", ], url: "http://www.redhat.com/support/errata/RHSA-2011-0896.html", }, { name: "HPSBUX02645", refsource: "HP", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://marc.info/?l=bugtraq&m=130168502603566&w=2", }, { name: "oval:org.mitre.oval:def:6883", refsource: "OVAL", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6883", }, { name: "oval:org.mitre.oval:def:12942", refsource: "OVAL", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12942", }, { name: "oval:org.mitre.oval:def:10613", refsource: "OVAL", tags: [ "Broken Link", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10613", }, { name: "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1888194 [6/13] - /httpd/site/trunk/content/security/json/", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073149 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073139 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E", }, { name: "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, }, lastModifiedDate: "2023-11-01T17:16Z", publishedDate: "2009-12-04T21:30Z", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.