Action not permitted
Modal body text goes here.
cve-2011-0997
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:14:27.265Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "47176", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/47176" }, { "name": "ADV-2011-0886", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0886" }, { "name": "44103", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44103" }, { "name": "RHSA-2011:0840", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0840.html" }, { "name": "44037", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44037" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832" }, { "name": "ADV-2011-0926", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0926" }, { "name": "HPSBMU02752", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2" }, { "name": "44127", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44127" }, { "name": "MDVSA-2011:073", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:073" }, { "name": "SSRT100802", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2" }, { "name": "ADV-2011-0909", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0909" }, { "name": "oval:org.mitre.oval:def:12812", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812" }, { "name": "71493", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/71493" }, { "name": "44090", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44090" }, { "name": "44048", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44048" }, { "name": "FEDORA-2011-4934", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997" }, { "name": "iscdhcp-dhclient-command-execution(66580)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66580" }, { "name": "ADV-2011-0879", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0879" }, { "name": "VU#107886", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/107886" }, { "name": "1025300", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1025300" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761" }, { "name": "SSA:2011-097-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345" }, { "name": "ADV-2011-1000", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/1000" }, { "name": "ADV-2011-0915", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0915" }, { "name": "ADV-2011-0965", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0965" }, { "name": "37623", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/37623/" }, { "name": "GLSA-201301-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201301-06.xml" }, { "name": "44180", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44180" }, { "name": "DSA-2217", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2217" }, { "name": "USN-1108-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1108-1" }, { "name": "DSA-2216", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2216" }, { "name": "FEDORA-2011-4897", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html" }, { "name": "RHSA-2011:0428", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0428.html" }, { "name": "44089", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44089" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "47176", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/47176" }, { "name": "ADV-2011-0886", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0886" }, { "name": "44103", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44103" }, { "name": "RHSA-2011:0840", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0840.html" }, { "name": "44037", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44037" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832" }, { "name": "ADV-2011-0926", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0926" }, { "name": "HPSBMU02752", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2" }, { "name": "44127", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44127" }, { "name": "MDVSA-2011:073", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:073" }, { "name": "SSRT100802", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2" }, { "name": "ADV-2011-0909", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0909" }, { "name": "oval:org.mitre.oval:def:12812", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812" }, { "name": "71493", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/71493" }, { "name": "44090", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44090" }, { "name": "44048", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44048" }, { "name": "FEDORA-2011-4934", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997" }, { "name": "iscdhcp-dhclient-command-execution(66580)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66580" }, { "name": "ADV-2011-0879", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0879" }, { "name": "VU#107886", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/107886" }, { "name": "1025300", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1025300" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761" }, { "name": "SSA:2011-097-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345" }, { "name": "ADV-2011-1000", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/1000" }, { "name": "ADV-2011-0915", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0915" }, { "name": "ADV-2011-0965", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0965" }, { "name": "37623", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/37623/" }, { "name": "GLSA-201301-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201301-06.xml" }, { "name": "44180", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44180" }, { "name": "DSA-2217", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2217" }, { "name": "USN-1108-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1108-1" }, { "name": "DSA-2216", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2216" }, { "name": "FEDORA-2011-4897", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html" }, { "name": "RHSA-2011:0428", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0428.html" }, { "name": "44089", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44089" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "47176", "refsource": "BID", "url": "http://www.securityfocus.com/bid/47176" }, { "name": "ADV-2011-0886", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0886" }, { "name": "44103", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44103" }, { "name": "RHSA-2011:0840", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0840.html" }, { "name": "44037", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44037" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=689832", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832" }, { "name": "ADV-2011-0926", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0926" }, { "name": "HPSBMU02752", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2" }, { "name": "44127", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44127" }, { "name": "MDVSA-2011:073", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:073" }, { "name": "SSRT100802", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2" }, { "name": "ADV-2011-0909", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0909" }, { "name": "oval:org.mitre.oval:def:12812", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812" }, { "name": "71493", "refsource": "OSVDB", "url": "http://www.osvdb.org/71493" }, { "name": "44090", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44090" }, { "name": "44048", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44048" }, { "name": "FEDORA-2011-4934", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html" }, { "name": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997", "refsource": "CONFIRM", "url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997" }, { "name": "iscdhcp-dhclient-command-execution(66580)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66580" }, { "name": "ADV-2011-0879", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0879" }, { "name": "VU#107886", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/107886" }, { "name": "1025300", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1025300" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761" }, { "name": "SSA:2011-097-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345" }, { "name": "ADV-2011-1000", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/1000" }, { "name": "ADV-2011-0915", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0915" }, { "name": "ADV-2011-0965", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0965" }, { "name": "37623", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/37623/" }, { "name": "GLSA-201301-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201301-06.xml" }, { "name": "44180", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44180" }, { "name": "DSA-2217", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2217" }, { "name": "USN-1108-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1108-1" }, { "name": "DSA-2216", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2216" }, { "name": "FEDORA-2011-4897", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html" }, { "name": "RHSA-2011:0428", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0428.html" }, { "name": "44089", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44089" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0997", "datePublished": "2011-04-08T15:00:00", "dateReserved": "2011-02-14T00:00:00", "dateUpdated": "2024-08-06T22:14:27.265Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-0997\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-04-08T15:17:27.387\",\"lastModified\":\"2020-04-01T13:07:53.590\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.\"},{\"lang\":\"es\",\"value\":\"dhclient en ISC DHCP 3.0.x hasta la versi\u00f3n 4.2.x en versiones anteriores a 4.2.1-P1, 3.1-ESV en versiones anteriores a 3.1-ESV-R1 y 4.1-ESV en versiones anteriores a 4.1-ESV-R2 permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de metacaracteres shell en un nombre de anfitri\u00f3n obtenido de un mensaje DHCP, como es demostrado por un nombre de anfitri\u00f3n dado por dhclient-script.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":7.5},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"648BBC1F-1792-443F-B625-67A05004EB7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA086AC5-9ADF-4EF9-9534-B1C78CD7A56C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E94449B-6FB0-4E4D-9D92-144A1C474761\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc10:*:*:*:*:*:*\",\"matchCriteriaId\":\"6824B249-D222-4F29-8C29-E92071F12621\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc11:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F7A3F32-C297-4331-9B8D-1CF8F3D32315\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc12:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4959ABA-9F2E-4003-9566-DBE3177AE233\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc13:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CE2A3CA-EFB6-4547-BED8-CAC39156F10B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc14:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DE205EE-F708-4E4A-A861-EBF6D3C062F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD8EBBF0-A61B-4FF0-B055-9BA2A21617A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3141202-993D-4E80-9EAD-ACA6C1343D6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E0768D1-37D3-4C17-A3A9-94EA237392AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"F167B922-DD9E-4DD1-BB8F-B232711BACCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E23602E-FFA1-49E2-BF4C-BC5D074517B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.1:rc9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DA200FE-D261-4532-AC63-1208611AFE46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"46030C9F-C817-4ACA-A89D-8CCD4DE97B3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.2:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A3649A4-BA40-4D8A-AB7C-AE1584459DFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ADC8A14-E847-4CC5-8FA5-522883DE324F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAA0C26C-9B0A-4ACB-9BD7-413F94948545\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.2:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DC6FA47-1F41-465D-8EAD-8116643ADAEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"87CBA8DD-650D-4A67-924C-B108CEE74BB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.3:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D71C1AA-E5F7-454B-9267-FE23E1C2AB31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.3:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D521DF6-AED8-40FA-B183-D469100B8B7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.3:b3:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD90F626-AC37-491A-A59D-11307D73E27A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F59B80F0-2FD5-461B-91C7-966BAFB5AB38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.4:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"34D8DF2C-387B-4880-9832-15583272E151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.4:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD78CE26-475D-4D8B-8625-CAE850F6E876\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.4:b3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9338F9AA-41F0-470E-BB49-C1A395376DF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6297233D-6C25-4A10-8F0A-79A8452ABAD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.5:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AC6F4D8-DD42-49F6-994C-75EFA888FA82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9D5A562-AEB5-41D8-9137-65B3100B1F21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.0.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AD8F74D-3F4B-4E25-92C9-D20C63B4B77E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1-esv:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7928AD6-4E2D-414D-A7E2-6DFB559CA1CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9AE49C-C152-4D0D-AB08-938F54631909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7528512B-66EC-4B2C-9158-34199C4A5FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.0:a2:*:*:*:*:*:*\",\"matchCriteriaId\":\"106F8860-B068-4B68-8734-206BFD401C3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.0:a3:*:*:*:*:*:*\",\"matchCriteriaId\":\"240D0880-DC35-41A6-B4F2-F9B73DF4AF59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6643B661-0253-4036-88D7-AF70B610B627\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.0:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFD04E6D-B418-4BCB-A3A1-CDFDEC271497\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA10784-1F4A-459B-8FFE-47E9993A63AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CF53110-2163-4474-81AC-846E8D502EB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"60FEE70E-514D-4481-A9AE-89FBF9E90AAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B571E882-C976-4156-BE03-96E52EA7463C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.2:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7A01E62-5C0B-4CB7-B1A3-A60269D901E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D25667FF-3EDC-4238-ADF5-25EFA4D88EDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B954F84E-1046-4A9F-AF86-7E62FDE88C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.3:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D60C4CBE-C104-4A12-B7DD-AFBB2C1C21AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:3.1.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4033956-E928-42F7-97E9-A2357CEACEE0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F27D0660-2F07-430B-A651-5D0B6AA763C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3120B566-2BB6-4A1F-9ED7-E099E2870919\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"150D46FA-873E-4E4F-8192-BCA1076994D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"56113AB6-8295-4EB7-A003-79049FBB8B4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*\",\"matchCriteriaId\":\"362DA97E-B940-4649-803F-26D8C1D16DA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"950A6BA0-C348-4B89-8C18-F2AFA467649F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9088D042-F104-4F31-AEBB-75F5A0F03AE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F159908A-00E7-4EC8-8342-28182F547C4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C49DF07-9612-43C7-9771-B76487B4A9CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6D8D55-DCD2-4E70-B3C6-76F2134DA336\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0F06FC0-6477-4589-B9CB-24B1F893EF09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CCA07EB-B0CB-40EE-B62E-DB4C408717B7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036E8A89-7A16-411F-9D31-676313BB7244\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2BCB73E-27BB-4878-AD9C-90C4F20C25A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"5D37DF0F-F863-45AC-853A-3E04F9FEC7CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87614B58-24AB-49FB-9C84-E8DDBA16353B\"}]}]}],\"references\":[{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44037\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44048\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44089\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44090\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44103\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44127\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/44180\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201301-06.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://securitytracker.com/id?1025300\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2216\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2217\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/107886\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:073\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.osvdb.org/71493\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0428.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0840.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/47176\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-1108-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0879\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0886\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0909\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0915\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0926\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0965\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/1000\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=689832\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/66580\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/37623/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.isc.org/software/dhcp/advisories/cve-2011-0997\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
var-201104-0082
Vulnerability from variot
dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script. The ISC dhclient contains a vulnerability that could allow a remote attacker to execute arbitrary code on the client machine. Apple From Apple Time Capsule and AirPort Base Station (802.11n) Firmware update for has been released.Crafted DHCP Any command may be executed by processing the response. A remote attacker can exploit this issue through a rogue DHCP server.
Additionally for Corporate Server 4 and Enterprise Server 5 ISC DHCP has been upgraded from the 3.0.7 version to the 4.1.2-P1 version which brings many enhancements such as better ipv6 support.
Packages for 2009.0 are provided as of the Extended Maintenance Program.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997 http://ftp.isc.org/isc/dhcp/dhcp-4.1.2-P1-RELNOTES https://www.isc.org/software/dhcp/advisories/cve-2011-0997
Updated Packages:
Mandriva Linux 2009.0: 0fe2b147ebdba8b68f69ddc27160db5c 2009.0/i586/dhcp-client-4.1.2-0.4mdv2009.0.i586.rpm f4ee7090da2bec5cb4482f2fa21beb8b 2009.0/i586/dhcp-common-4.1.2-0.4mdv2009.0.i586.rpm a4a5bd2f2d8f4d40a4c60d5dde55307c 2009.0/i586/dhcp-devel-4.1.2-0.4mdv2009.0.i586.rpm 814bc88e335fb03901f326300ae92961 2009.0/i586/dhcp-doc-4.1.2-0.4mdv2009.0.i586.rpm ec52571bb8002e9394b1eb6e6fc95b64 2009.0/i586/dhcp-relay-4.1.2-0.4mdv2009.0.i586.rpm e7fed43b5db92babf8ca3acbd7210b7f 2009.0/i586/dhcp-server-4.1.2-0.4mdv2009.0.i586.rpm 18489ac449e257f1fa9aad9e7a054b45 2009.0/SRPMS/dhcp-4.1.2-0.4mdv2009.0.src.rpm
Mandriva Linux 2009.0/X86_64: b557459f67de2b8ec481d313d9a26cb2 2009.0/x86_64/dhcp-client-4.1.2-0.4mdv2009.0.x86_64.rpm b4ea7a9670866fff6cd3f4eb77073a84 2009.0/x86_64/dhcp-common-4.1.2-0.4mdv2009.0.x86_64.rpm 4f9a9c9a9815697e17a65b942771e31d 2009.0/x86_64/dhcp-devel-4.1.2-0.4mdv2009.0.x86_64.rpm df18345c665846817880f815af0ad0e8 2009.0/x86_64/dhcp-doc-4.1.2-0.4mdv2009.0.x86_64.rpm eac313ff664e3ea9f8e4c3818d7b7387 2009.0/x86_64/dhcp-relay-4.1.2-0.4mdv2009.0.x86_64.rpm 48cca35591072588de0e1b9f00ca88eb 2009.0/x86_64/dhcp-server-4.1.2-0.4mdv2009.0.x86_64.rpm 18489ac449e257f1fa9aad9e7a054b45 2009.0/SRPMS/dhcp-4.1.2-0.4mdv2009.0.src.rpm
Mandriva Linux 2010.0: 88ba2b9d0ccfddf8b1b6f516851d08ce 2010.0/i586/dhcp-client-4.1.2-0.4mdv2010.0.i586.rpm 1475209ee7b9fb9b7f26ad5b20afcdcf 2010.0/i586/dhcp-common-4.1.2-0.4mdv2010.0.i586.rpm ea29d2bfd21b02a56057cd36dc21f43a 2010.0/i586/dhcp-devel-4.1.2-0.4mdv2010.0.i586.rpm 067c3ac4f7530e447f82bbe4326253a3 2010.0/i586/dhcp-doc-4.1.2-0.4mdv2010.0.i586.rpm 409516cfb0004d5f4522040b81433ce7 2010.0/i586/dhcp-relay-4.1.2-0.4mdv2010.0.i586.rpm a23871dfa6632571cdf4a2559941ad89 2010.0/i586/dhcp-server-4.1.2-0.4mdv2010.0.i586.rpm 265c9ec68af7e23baf8b1b6fcc4cc64f 2010.0/SRPMS/dhcp-4.1.2-0.4mdv2010.0.src.rpm
Mandriva Linux 2010.0/X86_64: 403dfe148141d926bc2f5e31c18360ba 2010.0/x86_64/dhcp-client-4.1.2-0.4mdv2010.0.x86_64.rpm 2cd0331b9935442a68d606e1d58b0608 2010.0/x86_64/dhcp-common-4.1.2-0.4mdv2010.0.x86_64.rpm 80a31ea430793ce9d2269c9d31aa03bd 2010.0/x86_64/dhcp-devel-4.1.2-0.4mdv2010.0.x86_64.rpm d5053dc644215e70dfc5380afdbc90c4 2010.0/x86_64/dhcp-doc-4.1.2-0.4mdv2010.0.x86_64.rpm 377fe3099561dd0a795617977164b91f 2010.0/x86_64/dhcp-relay-4.1.2-0.4mdv2010.0.x86_64.rpm 57b98ba8696c7a7d20ab96a823f4ff0d 2010.0/x86_64/dhcp-server-4.1.2-0.4mdv2010.0.x86_64.rpm 265c9ec68af7e23baf8b1b6fcc4cc64f 2010.0/SRPMS/dhcp-4.1.2-0.4mdv2010.0.src.rpm
Mandriva Linux 2010.1: 5b603213aa47a9772cf786ae6ee046da 2010.1/i586/dhcp-client-4.1.2-0.4mdv2010.2.i586.rpm 3046be07aaa09d1b39fcc8c07ef25e58 2010.1/i586/dhcp-common-4.1.2-0.4mdv2010.2.i586.rpm 1b5a481f6db0b53e666884cfda6ac44c 2010.1/i586/dhcp-devel-4.1.2-0.4mdv2010.2.i586.rpm 279beab531b59a715c946a00bd58fc48 2010.1/i586/dhcp-doc-4.1.2-0.4mdv2010.2.i586.rpm a328ab24b56f1ac03f8f420acd0a3806 2010.1/i586/dhcp-relay-4.1.2-0.4mdv2010.2.i586.rpm f7c61c55748270add2fe45d3245895c8 2010.1/i586/dhcp-server-4.1.2-0.4mdv2010.2.i586.rpm 30d4e8965d393765fb98b425889df126 2010.1/SRPMS/dhcp-4.1.2-0.4mdv2010.2.src.rpm
Mandriva Linux 2010.1/X86_64: 27f78c74028b1ea64dbd596c05cfa83f 2010.1/x86_64/dhcp-client-4.1.2-0.4mdv2010.2.x86_64.rpm ab56614386900415fecba15f4c17db13 2010.1/x86_64/dhcp-common-4.1.2-0.4mdv2010.2.x86_64.rpm 535a2eb4b6a4b1f78f47201e0b4249c3 2010.1/x86_64/dhcp-devel-4.1.2-0.4mdv2010.2.x86_64.rpm 64e9bac6fe8f4dbee3e1aebd5d91e977 2010.1/x86_64/dhcp-doc-4.1.2-0.4mdv2010.2.x86_64.rpm 612892e71f2aeddfd8b55cd7ac220247 2010.1/x86_64/dhcp-relay-4.1.2-0.4mdv2010.2.x86_64.rpm 9bb46bca8de30ee4b99bfe09867a3924 2010.1/x86_64/dhcp-server-4.1.2-0.4mdv2010.2.x86_64.rpm 30d4e8965d393765fb98b425889df126 2010.1/SRPMS/dhcp-4.1.2-0.4mdv2010.2.src.rpm
Corporate 4.0: f49d86732da26402b022b2d980049c03 corporate/4.0/i586/dhcp-client-4.1.2-0.4.20060mlcs4.i586.rpm acd985bc51c25cc42325befb357b0dcc corporate/4.0/i586/dhcp-common-4.1.2-0.4.20060mlcs4.i586.rpm c01506a802e46af23c8f10a72c6a0eb2 corporate/4.0/i586/dhcp-devel-4.1.2-0.4.20060mlcs4.i586.rpm 81522530fa5e97057d6eeea18ad7bec3 corporate/4.0/i586/dhcp-doc-4.1.2-0.4.20060mlcs4.i586.rpm 2ebfdf7ee9224b7403c4ab5e8370d9ab corporate/4.0/i586/dhcp-relay-4.1.2-0.4.20060mlcs4.i586.rpm c2bbacf8934b9e3dc78cdb49cd811ec9 corporate/4.0/i586/dhcp-server-4.1.2-0.4.20060mlcs4.i586.rpm ac3031a0c5dfeb6274aa28d669e66cba corporate/4.0/SRPMS/dhcp-4.1.2-0.4.20060mlcs4.src.rpm
Corporate 4.0/X86_64: 2747bf835e111141b9a91dc320eeab43 corporate/4.0/x86_64/dhcp-client-4.1.2-0.4.20060mlcs4.x86_64.rpm 0c998112346a5da94e09d55c996d6dff corporate/4.0/x86_64/dhcp-common-4.1.2-0.4.20060mlcs4.x86_64.rpm fd38ef505da0c593ef900895abeb1ddc corporate/4.0/x86_64/dhcp-devel-4.1.2-0.4.20060mlcs4.x86_64.rpm 69b3d6cbf21c46828de40a322fd1310d corporate/4.0/x86_64/dhcp-doc-4.1.2-0.4.20060mlcs4.x86_64.rpm c5acb788ae76e674952d656fa9b0d1a5 corporate/4.0/x86_64/dhcp-relay-4.1.2-0.4.20060mlcs4.x86_64.rpm e19db50139a291a7acd23491af5f8d54 corporate/4.0/x86_64/dhcp-server-4.1.2-0.4.20060mlcs4.x86_64.rpm ac3031a0c5dfeb6274aa28d669e66cba corporate/4.0/SRPMS/dhcp-4.1.2-0.4.20060mlcs4.src.rpm
Mandriva Enterprise Server 5: 7cbe686b047a6fd6f95cda44669e5862 mes5/i586/dhcp-client-4.1.2-0.4mdvmes5.2.i586.rpm af8b9fe15591b76c11f2257e0cb43a37 mes5/i586/dhcp-common-4.1.2-0.4mdvmes5.2.i586.rpm 2a22a53e6de1a9333c36c5cc250c5ac4 mes5/i586/dhcp-devel-4.1.2-0.4mdvmes5.2.i586.rpm 9ca551145fc79919000a61419e72de37 mes5/i586/dhcp-doc-4.1.2-0.4mdvmes5.2.i586.rpm e9faa5fae712882720b107eb02e51f1f mes5/i586/dhcp-relay-4.1.2-0.4mdvmes5.2.i586.rpm 8568f3bac9dd6654b63ebee94c33275e mes5/i586/dhcp-server-4.1.2-0.4mdvmes5.2.i586.rpm 0e5415cf40dde2931cd1b81aada5e7f7 mes5/SRPMS/dhcp-4.1.2-0.4mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64: 87ae497e9b94fb842718b4fbefb55474 mes5/x86_64/dhcp-client-4.1.2-0.4mdvmes5.2.x86_64.rpm 71d70558972e1f0729513fce69183de2 mes5/x86_64/dhcp-common-4.1.2-0.4mdvmes5.2.x86_64.rpm 0f12150d87816bd1770388d8dc309d21 mes5/x86_64/dhcp-devel-4.1.2-0.4mdvmes5.2.x86_64.rpm 0450f2a86dab4988d1c96a8e9747104f mes5/x86_64/dhcp-doc-4.1.2-0.4mdvmes5.2.x86_64.rpm 6a043f417310b6229e8fb8d967c12a8d mes5/x86_64/dhcp-relay-4.1.2-0.4mdvmes5.2.x86_64.rpm e4281f48c410412f60fd33f095b9199c mes5/x86_64/dhcp-server-4.1.2-0.4mdvmes5.2.x86_64.rpm 0e5415cf40dde2931cd1b81aada5e7f7 mes5/SRPMS/dhcp-4.1.2-0.4mdvmes5.2.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFNotZnmqjQ0CJFipgRAsarAJ4zitKb2D4e53sOLX4vqvuPs5tLCACffyPE Y8Ya7GFbhILVKuKTG+Ps+3k= =EXBX -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201301-06
http://security.gentoo.org/
Severity: Normal Title: ISC DHCP: Denial of Service Date: January 09, 2013 Bugs: #362453, #378799, #393617, #398763, #428120, #434880 ID: 201301-06
Synopsis
Multiple vulnerabilities have been found in ISC DHCP, the worst of which may allow remote Denial of Service.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/dhcp < 4.2.4_p2 >= 4.2.4_p2
Description
Multiple vulnerabilities have been discovered in ISC DHCP. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All ISC DHCP users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/dhcp-4.2.4_p2"
References
[ 1 ] CVE-2011-0997 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0997 [ 2 ] CVE-2011-2748 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2748 [ 3 ] CVE-2011-2749 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2749 [ 4 ] CVE-2011-4539 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4539 [ 5 ] CVE-2011-4868 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4868 [ 6 ] CVE-2012-3570 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3570 [ 7 ] CVE-2012-3571 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3571 [ 8 ] CVE-2012-3954 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3954 [ 9 ] CVE-2012-3955 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3955
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201301-06.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 .
Release Date: 2012-03-20 Last Updated: 2012-03-20
Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS)
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP Insight Control Software for Linux (IC-Linux).
References: CVE-2011-3210, CVE-2011-3207, CVE-2011-1097, CVE-2011-0997, CVE-2011-0762, CVE-2010-4645
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Insight Control Software for Linux (IC-Linux) before v7.0
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2011-3210 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2011-3207 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2011-1097 (AV:N/AC:H/Au:N/C:P/I:P/A:P) 5.1 CVE-2011-0997 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2011-0762 (AV:N/AC:L/Au:S/C:N/I:N/A:P) 4.0 CVE-2010-4645 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided HP Insight Control Software for Linux (IC-Linux) v7.0 to resolve the vulnerabilities. IC-Linux v7.0 is available here:
http://h18004.www1.hp.com/products/servers/management/insightcontrol_linux2/index.html
HISTORY Version:1 (rev.1) - 20 March 2012 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. This issue is addressed by stripping shell meta-characters in dhclient-script.
It is recommended that AirPort Utility 5.5.3 or later be installed before upgrading to Firmware version 7.6. ========================================================================== Ubuntu Security Notice USN-1108-2 April 19, 2011
dhcp3 vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.10
- Ubuntu 10.04 LTS
- Ubuntu 9.10
Summary:
An attacker's DHCP server could send crafted responses to your computer and cause it to run programs as root. Due to an error, the patch to fix the vulnerability was not properly applied on Ubuntu 9.10 and higher. This update fixes the problem.
Original advisory details:
Sebastian Krahmer discovered that the dhclient utility incorrectly filtered crafted responses.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 10.10: dhcp3-client 3.1.3-2ubuntu6.2
Ubuntu 10.04 LTS: dhcp3-client 3.1.3-2ubuntu3.2
Ubuntu 9.10: dhcp3-client 3.1.2-1ubuntu7.3
In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: dhcp security update Advisory ID: RHSA-2011:0840-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0840.html Issue date: 2011-05-31 CVE Names: CVE-2011-0997 =====================================================================
- Summary:
Updated dhcp packages that fix one security issue are now available for Red Hat Enterprise Linux 3 Extended Life Cycle Support.
The Red Hat Security Response Team has rated this update as having important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux AS (v. 3 ELS) - i386 Red Hat Enterprise Linux ES (v. 3 ELS) - i386
- Description:
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. A malicious DHCP server could send such an option with a specially-crafted value to a DHCP client. If this option's value was saved on the client system, and then later insecurely evaluated by a process that assumes the option is trusted, it could lead to arbitrary code execution with the privileges of that process. (CVE-2011-0997)
Red Hat would like to thank Sebastian Krahmer of the SuSE Security Team for reporting this issue.
All dhclient users should upgrade to these updated packages, which contain a backported patch to correct this issue.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259
- Bugs fixed (http://bugzilla.redhat.com/):
689832 - CVE-2011-0997 dhclient: insufficient sanitization of certain DHCP response values
- Package List:
Red Hat Enterprise Linux AS (v. 3 ELS):
Source: dhcp-3.0.1-10.3_EL3.src.rpm
i386: dhclient-3.0.1-10.3_EL3.i386.rpm dhcp-3.0.1-10.3_EL3.i386.rpm dhcp-debuginfo-3.0.1-10.3_EL3.i386.rpm dhcp-devel-3.0.1-10.3_EL3.i386.rpm
Red Hat Enterprise Linux ES (v. 3 ELS):
Source: dhcp-3.0.1-10.3_EL3.src.rpm
i386: dhclient-3.0.1-10.3_EL3.i386.rpm dhcp-3.0.1-10.3_EL3.i386.rpm dhcp-debuginfo-3.0.1-10.3_EL3.i386.rpm dhcp-devel-3.0.1-10.3_EL3.i386.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2011-0997.html https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFN5QSLXlSAg2UNWIIRAsdVAJ9mkD7RcbzsYOkK8JnEQsRSeelYuwCeNmZd LdK24/RBkJXiFOiY5pI8Eig= =HTuE -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.3-6ubuntu7.2.diff.gz
Size/MD5: 68426 b4a36d1b44e8276211cef0b9bfbb6ea5
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.3-6ubuntu7.2.dsc
Size/MD5: 1428 2fe76544defdfa3d4ab61d548ea5bc03
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.3.orig.tar.gz
Size/MD5: 870240 f91416a0b8ed3fd0601688cf0b7df58f
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.3-6ubuntu7.2_amd64.deb
Size/MD5: 221524 2cc3c7815cb6e6a2cc21d0c2a6286202
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.3-6ubuntu7.2_amd64.deb
Size/MD5: 454060 4d6e00d001d85359af4777316c012038
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.3-6ubuntu7.2_amd64.deb
Size/MD5: 131252 bf862b9ce2cc9888f9e617f42c0d8f77
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.3-6ubuntu7.2_amd64.deb
Size/MD5: 321024 383390887daadd122e7e66a9896e0432
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-client-udeb_3.0.3-6ubuntu7.2_amd64.udeb
Size/MD5: 177440 04a6bc2b53da66245b8b79b71d8f82ed
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.3-6ubuntu7.2_amd64.deb
Size/MD5: 105842 9616c95d8f2d487fd330fb9b33c58474
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.3-6ubuntu7.2_i386.deb
Size/MD5: 196930 ebaee96958395481e8c9c25a6591c1a3
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.3-6ubuntu7.2_i386.deb
Size/MD5: 431162 6fec8eaee0c753e95193f507e3c2c1eb
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.3-6ubuntu7.2_i386.deb
Size/MD5: 117544 76fd573dc96ade71033c31e9965a1ede
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.3-6ubuntu7.2_i386.deb
Size/MD5: 289684 8d0c386dc142ca3e69766e26fa6ced00
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-client-udeb_3.0.3-6ubuntu7.2_i386.udeb
Size/MD5: 152296 98cdda8ba797a8f3532e2db2c95f5329
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.3-6ubuntu7.2_i386.deb
Size/MD5: 94176 369f369a8fd6b58df3e293a5264c8047
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.3-6ubuntu7.2_powerpc.deb
Size/MD5: 203612 da623d9e1694169cfc1de56f2e0df6e4
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.3-6ubuntu7.2_powerpc.deb
Size/MD5: 435818 a6f18c0a5083885f0f3ad270a52f1ea9
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.3-6ubuntu7.2_powerpc.deb
Size/MD5: 130290 8ed50d04b1c91276b0bdf19b3cda3fcd
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.3-6ubuntu7.2_powerpc.deb
Size/MD5: 297742 95b7742e4fb7c4720add03965ef51b45
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-client-udeb_3.0.3-6ubuntu7.2_powerpc.udeb
Size/MD5: 158466 61e6403a4a5db1783c43fbfe6ad74e8c
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.3-6ubuntu7.2_powerpc.deb
Size/MD5: 96696 a7d275b7895e47d8141fab29a3db415b
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.3-6ubuntu7.2_sparc.deb
Size/MD5: 200826 04fe774f2349b12af88465a96a4443b4
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.3-6ubuntu7.2_sparc.deb
Size/MD5: 434238 c71c8b52f5324385d13e3610e7bef30e
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.3-6ubuntu7.2_sparc.deb
Size/MD5: 126784 ca67a9bd308dfb73bf85906f53e8ae6b
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.3-6ubuntu7.2_sparc.deb
Size/MD5: 294084 628696dfa6a0c9a2713b7fde4390d700
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-client-udeb_3.0.3-6ubuntu7.2_sparc.udeb
Size/MD5: 156068 907d41b490e6155c580b83cec96e3f71
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.3-6ubuntu7.2_sparc.deb
Size/MD5: 96810 d1559518c2fc467cf6244ee8cd29176b
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.6.dfsg-1ubuntu9.2.diff.gz
Size/MD5: 97783 a2e0e7077df662a15c039c462ecd8e3d
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.6.dfsg-1ubuntu9.2.dsc
Size/MD5: 1537 ccf77a9747dc8cbc6b65e0d94ab9c43b
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.6.dfsg.orig.tar.gz
Size/MD5: 724045 e89ef34005c576ddbb229e3b4478f6e2
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.0.6.dfsg-1ubuntu9.2_amd64.udeb
Size/MD5: 180140 9b8c326a22be742b43e2b8d9b07d4f86
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.6.dfsg-1ubuntu9.2_amd64.deb
Size/MD5: 242126 8053c2330e512d48f0318af10079c50a
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.6.dfsg-1ubuntu9.2_amd64.deb
Size/MD5: 300696 15bbfae5ba97f27d0c896b886773f02b
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.6.dfsg-1ubuntu9.2_amd64.deb
Size/MD5: 124032 82fe33e521c7ee08b7a00596acc8cb8d
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.6.dfsg-1ubuntu9.2_amd64.deb
Size/MD5: 342596 40acd4d59e72be79a5c930254bee0223
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.6.dfsg-1ubuntu9.2_amd64.deb
Size/MD5: 114396 5e5c7a86cec5ef70f927cbf53fffec4d
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.0.6.dfsg-1ubuntu9.2_i386.udeb
Size/MD5: 159988 7c2cd082adad4cdae500b88b9429ea24
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.6.dfsg-1ubuntu9.2_i386.deb
Size/MD5: 221966 92748d084525779ad31fe09ae76ca8d5
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.6.dfsg-1ubuntu9.2_i386.deb
Size/MD5: 281564 0e64a350c9599b473f42949dbaa44533
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.6.dfsg-1ubuntu9.2_i386.deb
Size/MD5: 109818 5ef8d14534865cdf0b63699e54ab684a
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.6.dfsg-1ubuntu9.2_i386.deb
Size/MD5: 318748 205746468ea8d58f1babe96c28f46983
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.6.dfsg-1ubuntu9.2_i386.deb
Size/MD5: 103376 15e19ab3867304e29f59f3e97170f145
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.0.6.dfsg-1ubuntu9.2_lpia.udeb
Size/MD5: 158248 1ce010480a0ea9a1a8683995ab5c9b68
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.0.6.dfsg-1ubuntu9.2_lpia.deb
Size/MD5: 220236 d0c1551dde51da5503fe3be6288a23bb
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.0.6.dfsg-1ubuntu9.2_lpia.deb
Size/MD5: 279790 cf35fa8aaca649fd85366e684628a580
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.0.6.dfsg-1ubuntu9.2_lpia.deb
Size/MD5: 109062 d1ff75192f05906028ac9001483529da
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.0.6.dfsg-1ubuntu9.2_lpia.deb
Size/MD5: 316576 6f95deb3879a7c38c0f9cd1ba1ff0228
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.0.6.dfsg-1ubuntu9.2_lpia.deb
Size/MD5: 102310 d4b1c32f8c1d1a6383fc09580e46ec79
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.0.6.dfsg-1ubuntu9.2_powerpc.udeb
Size/MD5: 177278 29a10d5d08bc3797b67770a4028758ff
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.0.6.dfsg-1ubuntu9.2_powerpc.deb
Size/MD5: 242046 27324a8f5623a94ff813148a5267fb4b
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.0.6.dfsg-1ubuntu9.2_powerpc.deb
Size/MD5: 296498 4b8af066dc6c2481e4ff360800c04e74
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.0.6.dfsg-1ubuntu9.2_powerpc.deb
Size/MD5: 122548 9ad8db4fbd23f1760d1bc123b01f014b
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.0.6.dfsg-1ubuntu9.2_powerpc.deb
Size/MD5: 341860 28075deaecbdc1d77166dcb1623a8c85
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.0.6.dfsg-1ubuntu9.2_powerpc.deb
Size/MD5: 112934 766413326d6486146da4aec03a2654bc
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.0.6.dfsg-1ubuntu9.2_sparc.udeb
Size/MD5: 156574 742d54969d6dd68e7ac86ca00e1b1832
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.0.6.dfsg-1ubuntu9.2_sparc.deb
Size/MD5: 218754 60013fe472200e1bf45d9b02d80a244e
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.0.6.dfsg-1ubuntu9.2_sparc.deb
Size/MD5: 277066 bf1034124c51ddacf732c2887957a46e
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.0.6.dfsg-1ubuntu9.2_sparc.deb
Size/MD5: 113494 b50639e27d92c0ababba9fab23242d7d
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.0.6.dfsg-1ubuntu9.2_sparc.deb
Size/MD5: 313426 b93d5ec9d7ea9717a79d6bf2bb80a285
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.0.6.dfsg-1ubuntu9.2_sparc.deb
Size/MD5: 102930 df99654fbd9e6f5aba7f962adb9d6470
Updated packages for Ubuntu 9.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.2-1ubuntu7.2.diff.gz
Size/MD5: 141611 0cab5bee752928f3c9f0c8e1ded26167
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.2-1ubuntu7.2.dsc
Size/MD5: 1955 a26905456538cd0d30e924e488302fc4
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.2.orig.tar.gz
Size/MD5: 799626 85901a9554650030df7d1ef3e5959fdf
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp-client_3.1.2-1ubuntu7.2_all.deb
Size/MD5: 26206 905e286082551fcbc23916052de7e2fa
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_amd64.udeb
Size/MD5: 208604 5bb8643607d5f416205174f97d443e8e
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_amd64.deb
Size/MD5: 270930 fa0267775f2471f0be30499bf121b6e7
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_amd64.deb
Size/MD5: 332152 ee101e67b7ad97bd410e983da115484d
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_amd64.deb
Size/MD5: 127130 0d4b4a1dc992d56f8c01d94990290910
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_amd64.deb
Size/MD5: 395062 a5ab658903283a97dd658e5cdfe6a45e
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_amd64.deb
Size/MD5: 125444 6f12bfb86b46567aa8e2ecba8af1852e
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_amd64.deb
Size/MD5: 348242 8fe33e4a7afac6d5a952d0c158d7ed45
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_i386.udeb
Size/MD5: 191210 64285abd7e68c517eefcf3ff5eecb909
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_i386.deb
Size/MD5: 252916 749769cec2a5d0cdfe5ddb67e6864270
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_i386.deb
Size/MD5: 315850 e0deb4932a763831adc3e73cf0f068fa
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_i386.deb
Size/MD5: 116650 434d9e26a1b3b5a4b5fd94bea2c581b4
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_i386.deb
Size/MD5: 372288 481d9d80e948895969b72be4b825fbb8
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_i386.deb
Size/MD5: 116424 49010850bef64719353588c5d88e6714
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_i386.deb
Size/MD5: 326174 7f328cba4c811d5d56582328f1ad6b1d
armel architecture (ARM Architecture):
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_armel.udeb
Size/MD5: 174400 4ed674aa3f13c4c4012def78b6cfd62f
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_armel.deb
Size/MD5: 236228 c14a8f75dc70e363afb2e39b9b6c9b68
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_armel.deb
Size/MD5: 300026 8183f7371713d8ddc8bd2b8f8d979794
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_armel.deb
Size/MD5: 112806 41dcceea5abd7feac4f1f7465b3892b7
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_armel.deb
Size/MD5: 349366 ea2f47d49b065c252caeb33d9d273363
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_armel.deb
Size/MD5: 108672 f277fadf0e50c5325b20f8001f30108a
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_armel.deb
Size/MD5: 301210 76887fde4612e80131c94a00b328a874
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_lpia.udeb
Size/MD5: 187330 e70af0ba0633b7a10c666f2f2e30b017
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_lpia.deb
Size/MD5: 249154 bde848f0444ac204f0781d848771b2e7
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_lpia.deb
Size/MD5: 312056 e131e50d9159fb5a7cf92bd7532c6d5b
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_lpia.deb
Size/MD5: 115610 6bf9bc6ccc3986f7bda77f6e0929bd2b
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_lpia.deb
Size/MD5: 368276 a5d4ce07f31b702817fb3d3961fd8a7b
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_lpia.deb
Size/MD5: 114588 d030b6a51bf6eb1b682c88fcfc92cdda
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_lpia.deb
Size/MD5: 321710 5c51aac0b4ea78167072cce854d63f47
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_powerpc.udeb
Size/MD5: 199998 aff548b71963695089f418a502bc5e01
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_powerpc.deb
Size/MD5: 262344 a4799a7b4c6d6d91120ef36537485080
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_powerpc.deb
Size/MD5: 324014 c6be94d8dda2d47ea08c3f1277160eda
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_powerpc.deb
Size/MD5: 120394 4b35e8aa5a363a659daa6232a0a76501
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_powerpc.deb
Size/MD5: 382434 9c71333d4f8ccc12d14996fa42ba60b7
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_powerpc.deb
Size/MD5: 120310 32c5affaeb955349a26cae2bd9c92236
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_powerpc.deb
Size/MD5: 335902 5460f8f32a30489940cf69855983ed3c
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_sparc.udeb
Size/MD5: 203458 038c030a32c3d74e3d20cb4f8eaf5336
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_sparc.deb
Size/MD5: 265862 67e06c4f7f5352a3248060245f41837c
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_sparc.deb
Size/MD5: 324634 873eeaf81f86f69e1de8f2c9c2335fda
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_sparc.deb
Size/MD5: 116874 4583b6c0cd5cf6abf8fc81ae1c5656a2
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_sparc.deb
Size/MD5: 387388 d31379a7fe21d36761ce6d6e01d51ba7
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_sparc.deb
Size/MD5: 121616 62ed8721ad7cfe9f45448c321be12340
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_sparc.deb
Size/MD5: 341160 9e72b31fccc6ca7d33fcf814f7cca8be
Updated packages for Ubuntu 10.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.3-2ubuntu3.1.diff.gz
Size/MD5: 145049 762c8d99c1e8e1245830ff0cfc9c22cf
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.3-2ubuntu3.1.dsc
Size/MD5: 1950 6fc0ed0a5f2f2897b25cb127fdf599bb
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.3.orig.tar.gz
Size/MD5: 804097 6ee8af8b283c95b3b4db5e88b6dd9a26
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp-client_3.1.3-2ubuntu3.1_all.deb
Size/MD5: 27294 5873371bf57e765fd69a49ab238f7f5f
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu3.1_amd64.udeb
Size/MD5: 208924 47388e6df5a8a88758f893f0157f7a49
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu3.1_amd64.deb
Size/MD5: 273438 3e968127e7212b682e23422ccd498a51
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu3.1_amd64.deb
Size/MD5: 335524 c2231ce6ce81fa1a61f33b50879ea8e7
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu3.1_amd64.deb
Size/MD5: 127748 31baa39d20b53e7200b146bb5e1dbc7a
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu3.1_amd64.deb
Size/MD5: 396594 05f2652d1223dbbf59bcfdb86503ec81
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu3.1_amd64.deb
Size/MD5: 126830 2017ee773f9e4c4136e6604003978a72
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu3.1_amd64.deb
Size/MD5: 349758 3a07e9f0c5b36e05024e98f2e01e7a36
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu3.1_i386.udeb
Size/MD5: 191468 7efe2e4b59392afda8ef1c8d69aa04cd
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu3.1_i386.deb
Size/MD5: 256600 1b24883c7ee056fcbcda20cc1d82673e
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu3.1_i386.deb
Size/MD5: 318512 8ad3080333f5d86ad40548de9cfced43
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu3.1_i386.deb
Size/MD5: 118816 c679db32ae992ca9f6fc5473e81df94a
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu3.1_i386.deb
Size/MD5: 376744 e3b708777fcd15c84240e43bf08b5d7e
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu3.1_i386.deb
Size/MD5: 117698 b0dfb728d6d9f69c9af3910744b1fbb8
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu3.1_i386.deb
Size/MD5: 328168 617edc965494055443d2c43326c411d7
armel architecture (ARM Architecture):
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu3.1_armel.udeb
Size/MD5: 180926 3969ae580d52c38b45d63ac388cbbe4d
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu3.1_armel.deb
Size/MD5: 246116 4956ee0ca5be72ee8ece1cd89ccf5082
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu3.1_armel.deb
Size/MD5: 309348 c8567f86659a5670b6c7167a106bf71a
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu3.1_armel.deb
Size/MD5: 115350 023f49615f6ca0a8f2367e816921fa8d
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu3.1_armel.deb
Size/MD5: 361242 b8e92e0d7ee35dccf62349627513b3d5
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu3.1_armel.deb
Size/MD5: 113136 ecc1eca1107bf3d2a85145c87800f0a9
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu3.1_armel.deb
Size/MD5: 314078 a09784b9e5545593b771e8db596b70ad
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu3.1_powerpc.udeb
Size/MD5: 200432 0db5e288252f7cec9511aeedd6328a87
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu3.1_powerpc.deb
Size/MD5: 265410 78eb3d25b509d5d3669a33bf8603b0df
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu3.1_powerpc.deb
Size/MD5: 327180 9d47f9f6bd35ebd5e53e68ff8cf27473
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu3.1_powerpc.deb
Size/MD5: 121552 7d955d50534795154e471aea30341fe1
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu3.1_powerpc.deb
Size/MD5: 385370 dd7f5ffd85a725a8cb4f8fe6a067d0bb
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu3.1_powerpc.deb
Size/MD5: 121446 0ccdd1ca74fcd96be84596ce324f967e
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu3.1_powerpc.deb
Size/MD5: 337410 54549752057dc73a3e35a158b871ea36
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu3.1_sparc.udeb
Size/MD5: 212712 be3c531c2fffd6ad83501e44015a3532
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu3.1_sparc.deb
Size/MD5: 277974 5a9ee5790cc705c845cd085c71d001b5
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu3.1_sparc.deb
Size/MD5: 335174 22b404e90f206772c786f968392ecef1
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu3.1_sparc.deb
Size/MD5: 121764 97643d01dd5dd3eb06859cb881312e6d
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu3.1_sparc.deb
Size/MD5: 402564 889e3a0882bebb5b4ceb4df3c805d883
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu3.1_sparc.deb
Size/MD5: 126888 546ab5281e2ba4672471a30fce814e36
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu3.1_sparc.deb
Size/MD5: 353712 64fcbf89ca8fd7af9aa2a9bd66739170
Updated packages for Ubuntu 10.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.3-2ubuntu6.1.diff.gz
Size/MD5: 151417 604106743c8429a59b9b8af55de854f7
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.3-2ubuntu6.1.dsc
Size/MD5: 1962 792f947b2a6c3020c45ca1b56771c77e
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.3.orig.tar.gz
Size/MD5: 804097 6ee8af8b283c95b3b4db5e88b6dd9a26
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp-client_3.1.3-2ubuntu6.1_all.deb
Size/MD5: 27778 319b0ce429e455b13a2248cc2cbe3491
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu6.1_amd64.udeb
Size/MD5: 208588 f4d4d2a63016b2b9960654be7c04b9c5
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu6.1_amd64.deb
Size/MD5: 274192 4005626ae7c8ed06bf15a1e014968ebd
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu6.1_amd64.deb
Size/MD5: 335392 3f745248ea2b2c54e1771f1789cd13dc
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu6.1_amd64.deb
Size/MD5: 128922 dc2dd29ead86d887a22da63f27ae9692
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu6.1_amd64.deb
Size/MD5: 398270 ffd780e99cb19cc3884703ec930a68cb
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu6.1_amd64.deb
Size/MD5: 126752 a4d3f03e0855ce6ef4cf6a75f33198d1
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu6.1_amd64.deb
Size/MD5: 349942 430e5e501488da92c3b4e2f2a685912a
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu6.1_i386.udeb
Size/MD5: 190312 23ced3137d0e056d9ce13dd41e656af3
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu6.1_i386.deb
Size/MD5: 255768 07cfc1c5db7b6d8585e9a00513699049
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu6.1_i386.deb
Size/MD5: 317854 f9a58ae40c5f2645e17e2a9349f07edf
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu6.1_i386.deb
Size/MD5: 119094 9af94d26ecd3ce03c9d059ab8db5ff46
http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu6.1_i386.deb
Size/MD5: 376052 2dd5ab42f28d13baab1d332c92fcdbcf
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu6.1_i386.deb
Size/MD5: 117472 9638997daef5f353621a3adea0f054d5
http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu6.1_i386.deb
Size/MD5: 327368 93d8a202391be7d55484901a7fa00f09
armel architecture (ARM Architecture):
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu6.1_armel.udeb
Size/MD5: 191162 ea1961dc40672d12302dcb3e0ae62c44
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu6.1_armel.deb
Size/MD5: 256344 fd6d84d8ca333a1e0cc0efc4c26df7cb
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu6.1_armel.deb
Size/MD5: 319110 4ed5fb07ce8a4997c1132f96e4c29e39
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu6.1_armel.deb
Size/MD5: 118586 ade0a8cfa1217ae39ff58bea47e4faa0
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu6.1_armel.deb
Size/MD5: 377976 7f26e7b4442f8b17b8178fc7b44e6720
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu6.1_armel.deb
Size/MD5: 118802 ee96894319dbf620dbf981a2493cefa0
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu6.1_armel.deb
Size/MD5: 328204 3a65c3fb55385716b19bbb6fce72ab07
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu6.1_powerpc.udeb
Size/MD5: 199526 1a984e2503c1a015134cf94e273b768a
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu6.1_powerpc.deb
Size/MD5: 264952 7a2139af6f6681dae88cd826c04ce61e
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu6.1_powerpc.deb
Size/MD5: 326646 8a1aaf899283814de8b8bcca6125576d
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu6.1_powerpc.deb
Size/MD5: 121952 90719742a1e133ae5edb9c5d6e72ad06
http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu6.1_powerpc.deb
Size/MD5: 384922 1cb9a8d40d9405b061b28cd2236d3acd
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu6.1_powerpc.deb
Size/MD5: 121542 81b420f37a81e5a05e5aadeaf1cb47c3
http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu6.1_powerpc.deb
Size/MD5: 336918 26cba2f6096556526ce2a64556f571e5
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201104-0082", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "debian", "version": "5.0" }, { "model": "dhcp", "scope": "eq", "trust": 1.0, "vendor": "isc", "version": "3.0.5" }, { "model": "dhcp", "scope": "eq", "trust": 1.0, "vendor": "isc", "version": "4.1-esv" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "10.10" }, { "model": "dhcp", "scope": "eq", "trust": 1.0, "vendor": "isc", "version": "3.0.1" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.0" }, { "model": "dhcp", "scope": "eq", "trust": 1.0, "vendor": "isc", "version": "3.1.1" }, { "model": "dhcp", "scope": "eq", "trust": 1.0, "vendor": "isc", "version": "3.1.3" }, { "model": "dhcp", "scope": "eq", "trust": 1.0, "vendor": "isc", "version": "3.1.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "8.04" }, { "model": "dhcp", "scope": "eq", "trust": 1.0, "vendor": "isc", "version": "3.0.4" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "10.04" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "6.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "9.10" }, { "model": "dhcp", "scope": "eq", "trust": 1.0, "vendor": "isc", "version": "3.0.2" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "6.06" }, { "model": "dhcp", "scope": "eq", "trust": 1.0, "vendor": "isc", "version": "3.0" }, { "model": "dhcp", "scope": "eq", "trust": 1.0, "vendor": "isc", "version": "3.0.6" }, { "model": "dhcp", "scope": "eq", "trust": 1.0, "vendor": "isc", "version": "4.2.1" }, { "model": "dhcp", "scope": "eq", "trust": 1.0, "vendor": "isc", "version": "3.1-esv" }, { "model": "dhcp", "scope": "eq", "trust": 1.0, "vendor": "isc", "version": "4.2.0" }, { "model": "dhcp", "scope": "eq", "trust": 1.0, "vendor": "isc", "version": "3.0.3" }, { "model": "dhcp", "scope": "eq", "trust": 1.0, "vendor": "isc", "version": "3.1.2" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "debian gnu linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fedora", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "internet consortium", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mandriva s a", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "slackware linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubuntu", "version": null }, { "model": "airmac base station", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "7.6" }, { "model": "time capsule", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "dhcp client 4.0.1p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "aura conferencing", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "dhcpd 3.0.2rc1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "dhcpd 4.0.1p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux enterprise sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "time capsule", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.4.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "12.0" }, { "model": "xenserver sp2", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.6" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "5.0.1" }, { "model": "dhcpd rc5", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0.1" }, { "model": "dhcp client 3.1.2p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.0" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "4.0.1" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "dhcp client 3.1-esv-r1", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": null }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "dhcpd rc6", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "12.2" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "4.0" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "aura system manager", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "aura conferencing sp1 standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "dhcpd rc4", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.3" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "dhcp client 4.1.1-p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "enterprise linux desktop version", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "dhcp client 4.1.0p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "esx", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.1" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "dhcpd", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "4.1.1" }, { "model": "meeting exchange sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "11.0" }, { "model": "dhcpd", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "4.1" }, { "model": "dhcpd rc1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "dhcpd 4.0.2-p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "time capsule", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.5.2" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "4.0.2" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "dhcpd pl2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.4" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "time capsule", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.5" }, { "model": "time capsule", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "linux enterprise sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "dhcpd", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0" }, { "model": "dhcp client b1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.0" }, { "model": "time capsule", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.4.1" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "5.0" }, { "model": "dhcpd rc7", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0.1" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "airport express base station with 802.11n", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.4.1" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.8" }, { "model": "dhcpd rc11", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "dhcpd", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.1.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.3" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "messaging storage server sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "messaging storage server sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "aura system platform sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "dhcpd 4.2.1-p1", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": null }, { "model": "aura presence services", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "aura system platform sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "dhcp client 4.0.2-p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "message networking", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "5.2.4" }, { "model": "xenserver", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.5" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "dhcpd", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0.4" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "12.1" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "dhcp client", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "4.0" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "5.0.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "9.1" }, { "model": "linux enterprise sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "current", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "dhcpd rc13", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0.1" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "ctpview", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "7.3" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "linux enterprise sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.1" }, { "model": "time capsule", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "7.6" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "insight control for linux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "10.2" }, { "model": "airport express base station with 802.11n", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "7.6" }, { "model": "airport express base station with 802.11n", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.5.2" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "ctpview 7.1r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "dhcpd rc10", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "dhcpd 4.1-esv-r2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": null }, { "model": "dhcpd 3.1-esv-r1", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": null }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.5" }, { "model": "dhcp client 4.2.1-p1", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": null }, { "model": "beta2", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "4.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "dhcpd b2pl9", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0" }, { "model": "xenserver feature pack", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.61" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "ip office application server", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "ctpview 7.3r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "novell linux pos", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "esx", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.5" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "0" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.3" }, { "model": "dhcpd rc8", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0.1" }, { "model": "dhcpd pl1", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0" }, { "model": "dhcp client b1pl14", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "xenserver", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.6" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "dhcp client", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "4.1" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "dhcpd 4.1.1-p1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "dhcpd rc2", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0.1" }, { "model": "dhcp client b1pl17", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0" }, { "model": "dhcpd rc9", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0.1" }, { "model": "netbsd", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "5.1" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "dhcp client", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "messaging storage server sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "xenserver common criteria", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.6" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "aura conferencing standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "dhcp client 4.1-esv-r2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": null }, { "model": "aura system manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20090" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.2" }, { "model": "dhcpd rc14", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0.1" }, { "model": "dhcpd rc12", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0" }, { "model": "dhcpd 3.0.5b1", "scope": null, "trust": 0.3, "vendor": "isc", "version": null }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "dhcpd rc3", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "messaging storage server sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "esx", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "dhcpd rc12", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0.1" }, { "model": "dhcpd rc4", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0.1" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "dhcpd b2pl23", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "3.0" }, { "model": "xenserver update", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.03" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "ctpview 7.1r3", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "ctpview 7.1r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "dhcpd", "scope": "eq", "trust": 0.3, "vendor": "isc", "version": "4.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "rc3", "scope": "eq", "trust": 0.3, "vendor": "netbsd", "version": "5.0" }, { "model": "4,0 beta", "scope": null, "trust": 0.3, "vendor": "netbsd", "version": null }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "messaging storage server sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "linux x86 64 -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#107886" }, { "db": "BID", "id": "47176" }, { "db": "JVNDB", "id": "JVNDB-2011-003066" }, { "db": "NVD", "id": "CVE-2011-0997" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.2:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.2:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.2:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.2:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.2:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.3:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.3:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.3:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.3:b3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.4:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.4:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.4:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.4:b3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.4:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.5:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.5:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.6:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1-esv:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:a1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:a2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:a3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.2:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.2:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.2:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.3:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.3:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.3:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2011-0997" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Sebastian Krahmer and Marius Tomaschewski from the SUSE Security Team", "sources": [ { "db": "BID", "id": "47176" } ], "trust": 0.3 }, "cve": "CVE-2011-0997", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2011-0997", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2011-0997", "trust": 1.8, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#107886", "trust": 0.8, "value": "11.34" }, { "author": "VULMON", "id": "CVE-2011-0997", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#107886" }, { "db": "VULMON", "id": "CVE-2011-0997" }, { "db": "JVNDB", "id": "JVNDB-2011-003066" }, { "db": "NVD", "id": "CVE-2011-0997" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script. The ISC dhclient contains a vulnerability that could allow a remote attacker to execute arbitrary code on the client machine. Apple From Apple Time Capsule and AirPort Base Station (802.11n) Firmware update for has been released.Crafted DHCP Any command may be executed by processing the response. \nA remote attacker can exploit this issue through a rogue DHCP server. \n \n Additionally for Corporate Server 4 and Enterprise Server 5 ISC DHCP\n has been upgraded from the 3.0.7 version to the 4.1.2-P1 version\n which brings many enhancements such as better ipv6 support. \n \n Packages for 2009.0 are provided as of the Extended Maintenance\n Program. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997\n http://ftp.isc.org/isc/dhcp/dhcp-4.1.2-P1-RELNOTES\n https://www.isc.org/software/dhcp/advisories/cve-2011-0997\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Linux 2009.0:\n 0fe2b147ebdba8b68f69ddc27160db5c 2009.0/i586/dhcp-client-4.1.2-0.4mdv2009.0.i586.rpm\n f4ee7090da2bec5cb4482f2fa21beb8b 2009.0/i586/dhcp-common-4.1.2-0.4mdv2009.0.i586.rpm\n a4a5bd2f2d8f4d40a4c60d5dde55307c 2009.0/i586/dhcp-devel-4.1.2-0.4mdv2009.0.i586.rpm\n 814bc88e335fb03901f326300ae92961 2009.0/i586/dhcp-doc-4.1.2-0.4mdv2009.0.i586.rpm\n ec52571bb8002e9394b1eb6e6fc95b64 2009.0/i586/dhcp-relay-4.1.2-0.4mdv2009.0.i586.rpm\n e7fed43b5db92babf8ca3acbd7210b7f 2009.0/i586/dhcp-server-4.1.2-0.4mdv2009.0.i586.rpm \n 18489ac449e257f1fa9aad9e7a054b45 2009.0/SRPMS/dhcp-4.1.2-0.4mdv2009.0.src.rpm\n\n Mandriva Linux 2009.0/X86_64:\n b557459f67de2b8ec481d313d9a26cb2 2009.0/x86_64/dhcp-client-4.1.2-0.4mdv2009.0.x86_64.rpm\n b4ea7a9670866fff6cd3f4eb77073a84 2009.0/x86_64/dhcp-common-4.1.2-0.4mdv2009.0.x86_64.rpm\n 4f9a9c9a9815697e17a65b942771e31d 2009.0/x86_64/dhcp-devel-4.1.2-0.4mdv2009.0.x86_64.rpm\n df18345c665846817880f815af0ad0e8 2009.0/x86_64/dhcp-doc-4.1.2-0.4mdv2009.0.x86_64.rpm\n eac313ff664e3ea9f8e4c3818d7b7387 2009.0/x86_64/dhcp-relay-4.1.2-0.4mdv2009.0.x86_64.rpm\n 48cca35591072588de0e1b9f00ca88eb 2009.0/x86_64/dhcp-server-4.1.2-0.4mdv2009.0.x86_64.rpm \n 18489ac449e257f1fa9aad9e7a054b45 2009.0/SRPMS/dhcp-4.1.2-0.4mdv2009.0.src.rpm\n\n Mandriva Linux 2010.0:\n 88ba2b9d0ccfddf8b1b6f516851d08ce 2010.0/i586/dhcp-client-4.1.2-0.4mdv2010.0.i586.rpm\n 1475209ee7b9fb9b7f26ad5b20afcdcf 2010.0/i586/dhcp-common-4.1.2-0.4mdv2010.0.i586.rpm\n ea29d2bfd21b02a56057cd36dc21f43a 2010.0/i586/dhcp-devel-4.1.2-0.4mdv2010.0.i586.rpm\n 067c3ac4f7530e447f82bbe4326253a3 2010.0/i586/dhcp-doc-4.1.2-0.4mdv2010.0.i586.rpm\n 409516cfb0004d5f4522040b81433ce7 2010.0/i586/dhcp-relay-4.1.2-0.4mdv2010.0.i586.rpm\n a23871dfa6632571cdf4a2559941ad89 2010.0/i586/dhcp-server-4.1.2-0.4mdv2010.0.i586.rpm \n 265c9ec68af7e23baf8b1b6fcc4cc64f 2010.0/SRPMS/dhcp-4.1.2-0.4mdv2010.0.src.rpm\n\n Mandriva Linux 2010.0/X86_64:\n 403dfe148141d926bc2f5e31c18360ba 2010.0/x86_64/dhcp-client-4.1.2-0.4mdv2010.0.x86_64.rpm\n 2cd0331b9935442a68d606e1d58b0608 2010.0/x86_64/dhcp-common-4.1.2-0.4mdv2010.0.x86_64.rpm\n 80a31ea430793ce9d2269c9d31aa03bd 2010.0/x86_64/dhcp-devel-4.1.2-0.4mdv2010.0.x86_64.rpm\n d5053dc644215e70dfc5380afdbc90c4 2010.0/x86_64/dhcp-doc-4.1.2-0.4mdv2010.0.x86_64.rpm\n 377fe3099561dd0a795617977164b91f 2010.0/x86_64/dhcp-relay-4.1.2-0.4mdv2010.0.x86_64.rpm\n 57b98ba8696c7a7d20ab96a823f4ff0d 2010.0/x86_64/dhcp-server-4.1.2-0.4mdv2010.0.x86_64.rpm \n 265c9ec68af7e23baf8b1b6fcc4cc64f 2010.0/SRPMS/dhcp-4.1.2-0.4mdv2010.0.src.rpm\n\n Mandriva Linux 2010.1:\n 5b603213aa47a9772cf786ae6ee046da 2010.1/i586/dhcp-client-4.1.2-0.4mdv2010.2.i586.rpm\n 3046be07aaa09d1b39fcc8c07ef25e58 2010.1/i586/dhcp-common-4.1.2-0.4mdv2010.2.i586.rpm\n 1b5a481f6db0b53e666884cfda6ac44c 2010.1/i586/dhcp-devel-4.1.2-0.4mdv2010.2.i586.rpm\n 279beab531b59a715c946a00bd58fc48 2010.1/i586/dhcp-doc-4.1.2-0.4mdv2010.2.i586.rpm\n a328ab24b56f1ac03f8f420acd0a3806 2010.1/i586/dhcp-relay-4.1.2-0.4mdv2010.2.i586.rpm\n f7c61c55748270add2fe45d3245895c8 2010.1/i586/dhcp-server-4.1.2-0.4mdv2010.2.i586.rpm \n 30d4e8965d393765fb98b425889df126 2010.1/SRPMS/dhcp-4.1.2-0.4mdv2010.2.src.rpm\n\n Mandriva Linux 2010.1/X86_64:\n 27f78c74028b1ea64dbd596c05cfa83f 2010.1/x86_64/dhcp-client-4.1.2-0.4mdv2010.2.x86_64.rpm\n ab56614386900415fecba15f4c17db13 2010.1/x86_64/dhcp-common-4.1.2-0.4mdv2010.2.x86_64.rpm\n 535a2eb4b6a4b1f78f47201e0b4249c3 2010.1/x86_64/dhcp-devel-4.1.2-0.4mdv2010.2.x86_64.rpm\n 64e9bac6fe8f4dbee3e1aebd5d91e977 2010.1/x86_64/dhcp-doc-4.1.2-0.4mdv2010.2.x86_64.rpm\n 612892e71f2aeddfd8b55cd7ac220247 2010.1/x86_64/dhcp-relay-4.1.2-0.4mdv2010.2.x86_64.rpm\n 9bb46bca8de30ee4b99bfe09867a3924 2010.1/x86_64/dhcp-server-4.1.2-0.4mdv2010.2.x86_64.rpm \n 30d4e8965d393765fb98b425889df126 2010.1/SRPMS/dhcp-4.1.2-0.4mdv2010.2.src.rpm\n\n Corporate 4.0:\n f49d86732da26402b022b2d980049c03 corporate/4.0/i586/dhcp-client-4.1.2-0.4.20060mlcs4.i586.rpm\n acd985bc51c25cc42325befb357b0dcc corporate/4.0/i586/dhcp-common-4.1.2-0.4.20060mlcs4.i586.rpm\n c01506a802e46af23c8f10a72c6a0eb2 corporate/4.0/i586/dhcp-devel-4.1.2-0.4.20060mlcs4.i586.rpm\n 81522530fa5e97057d6eeea18ad7bec3 corporate/4.0/i586/dhcp-doc-4.1.2-0.4.20060mlcs4.i586.rpm\n 2ebfdf7ee9224b7403c4ab5e8370d9ab corporate/4.0/i586/dhcp-relay-4.1.2-0.4.20060mlcs4.i586.rpm\n c2bbacf8934b9e3dc78cdb49cd811ec9 corporate/4.0/i586/dhcp-server-4.1.2-0.4.20060mlcs4.i586.rpm \n ac3031a0c5dfeb6274aa28d669e66cba corporate/4.0/SRPMS/dhcp-4.1.2-0.4.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n 2747bf835e111141b9a91dc320eeab43 corporate/4.0/x86_64/dhcp-client-4.1.2-0.4.20060mlcs4.x86_64.rpm\n 0c998112346a5da94e09d55c996d6dff corporate/4.0/x86_64/dhcp-common-4.1.2-0.4.20060mlcs4.x86_64.rpm\n fd38ef505da0c593ef900895abeb1ddc corporate/4.0/x86_64/dhcp-devel-4.1.2-0.4.20060mlcs4.x86_64.rpm\n 69b3d6cbf21c46828de40a322fd1310d corporate/4.0/x86_64/dhcp-doc-4.1.2-0.4.20060mlcs4.x86_64.rpm\n c5acb788ae76e674952d656fa9b0d1a5 corporate/4.0/x86_64/dhcp-relay-4.1.2-0.4.20060mlcs4.x86_64.rpm\n e19db50139a291a7acd23491af5f8d54 corporate/4.0/x86_64/dhcp-server-4.1.2-0.4.20060mlcs4.x86_64.rpm \n ac3031a0c5dfeb6274aa28d669e66cba corporate/4.0/SRPMS/dhcp-4.1.2-0.4.20060mlcs4.src.rpm\n\n Mandriva Enterprise Server 5:\n 7cbe686b047a6fd6f95cda44669e5862 mes5/i586/dhcp-client-4.1.2-0.4mdvmes5.2.i586.rpm\n af8b9fe15591b76c11f2257e0cb43a37 mes5/i586/dhcp-common-4.1.2-0.4mdvmes5.2.i586.rpm\n 2a22a53e6de1a9333c36c5cc250c5ac4 mes5/i586/dhcp-devel-4.1.2-0.4mdvmes5.2.i586.rpm\n 9ca551145fc79919000a61419e72de37 mes5/i586/dhcp-doc-4.1.2-0.4mdvmes5.2.i586.rpm\n e9faa5fae712882720b107eb02e51f1f mes5/i586/dhcp-relay-4.1.2-0.4mdvmes5.2.i586.rpm\n 8568f3bac9dd6654b63ebee94c33275e mes5/i586/dhcp-server-4.1.2-0.4mdvmes5.2.i586.rpm \n 0e5415cf40dde2931cd1b81aada5e7f7 mes5/SRPMS/dhcp-4.1.2-0.4mdvmes5.2.src.rpm\n\n Mandriva Enterprise Server 5/X86_64:\n 87ae497e9b94fb842718b4fbefb55474 mes5/x86_64/dhcp-client-4.1.2-0.4mdvmes5.2.x86_64.rpm\n 71d70558972e1f0729513fce69183de2 mes5/x86_64/dhcp-common-4.1.2-0.4mdvmes5.2.x86_64.rpm\n 0f12150d87816bd1770388d8dc309d21 mes5/x86_64/dhcp-devel-4.1.2-0.4mdvmes5.2.x86_64.rpm\n 0450f2a86dab4988d1c96a8e9747104f mes5/x86_64/dhcp-doc-4.1.2-0.4mdvmes5.2.x86_64.rpm\n 6a043f417310b6229e8fb8d967c12a8d mes5/x86_64/dhcp-relay-4.1.2-0.4mdvmes5.2.x86_64.rpm\n e4281f48c410412f60fd33f095b9199c mes5/x86_64/dhcp-server-4.1.2-0.4mdvmes5.2.x86_64.rpm \n 0e5415cf40dde2931cd1b81aada5e7f7 mes5/SRPMS/dhcp-4.1.2-0.4mdvmes5.2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFNotZnmqjQ0CJFipgRAsarAJ4zitKb2D4e53sOLX4vqvuPs5tLCACffyPE\nY8Ya7GFbhILVKuKTG+Ps+3k=\n=EXBX\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201301-06\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: ISC DHCP: Denial of Service\n Date: January 09, 2013\n Bugs: #362453, #378799, #393617, #398763, #428120, #434880\n ID: 201301-06\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in ISC DHCP, the worst of\nwhich may allow remote Denial of Service. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/dhcp \u003c 4.2.4_p2 \u003e= 4.2.4_p2\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in ISC DHCP. Please\nreview the CVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll ISC DHCP users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/dhcp-4.2.4_p2\"\n\nReferences\n==========\n\n[ 1 ] CVE-2011-0997\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0997\n[ 2 ] CVE-2011-2748\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2748\n[ 3 ] CVE-2011-2749\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2749\n[ 4 ] CVE-2011-4539\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4539\n[ 5 ] CVE-2011-4868\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4868\n[ 6 ] CVE-2012-3570\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3570\n[ 7 ] CVE-2012-3571\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3571\n[ 8 ] CVE-2012-3954\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3954\n[ 9 ] CVE-2012-3955\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3955\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201301-06.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2013 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \n\nRelease Date: 2012-03-20\nLast Updated: 2012-03-20\n\nPotential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS)\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP Insight Control Software for Linux (IC-Linux). \n\nReferences: CVE-2011-3210, CVE-2011-3207, CVE-2011-1097, CVE-2011-0997, CVE-2011-0762, CVE-2010-4645\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP Insight Control Software for Linux (IC-Linux) before v7.0\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2011-3210 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2011-3207 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0\nCVE-2011-1097 (AV:N/AC:H/Au:N/C:P/I:P/A:P) 5.1\nCVE-2011-0997 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2011-0762 (AV:N/AC:L/Au:S/C:N/I:N/A:P) 4.0\nCVE-2010-4645 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided HP Insight Control Software for Linux (IC-Linux) v7.0 to resolve the vulnerabilities. IC-Linux v7.0 is available here:\n\nhttp://h18004.www1.hp.com/products/servers/management/insightcontrol_linux2/index.html\n\nHISTORY\nVersion:1 (rev.1) - 20 March 2012 Initial release\n\nThird Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in the title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2012 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. This issue is addressed by stripping shell meta-characters\nin dhclient-script. \n\nIt is recommended that AirPort Utility 5.5.3 or later be installed\nbefore upgrading to Firmware version 7.6. ==========================================================================\nUbuntu Security Notice USN-1108-2\nApril 19, 2011\n\ndhcp3 vulnerability\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 10.10\n- Ubuntu 10.04 LTS\n- Ubuntu 9.10\n\nSummary:\n\nAn attacker\u0027s DHCP server could send crafted responses to your computer and\ncause it to run programs as root. Due to an error, the patch to fix\nthe vulnerability was not properly applied on Ubuntu 9.10 and higher. This\nupdate fixes the problem. \n\nOriginal advisory details:\n\n Sebastian Krahmer discovered that the dhclient utility incorrectly filtered\n crafted responses. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 10.10:\n dhcp3-client 3.1.3-2ubuntu6.2\n\nUbuntu 10.04 LTS:\n dhcp3-client 3.1.3-2ubuntu3.2\n\nUbuntu 9.10:\n dhcp3-client 3.1.2-1ubuntu7.3\n\nIn general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: dhcp security update\nAdvisory ID: RHSA-2011:0840-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2011-0840.html\nIssue date: 2011-05-31\nCVE Names: CVE-2011-0997 \n=====================================================================\n\n1. Summary:\n\nUpdated dhcp packages that fix one security issue are now available for\nRed Hat Enterprise Linux 3 Extended Life Cycle Support. \n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux AS (v. 3 ELS) - i386\nRed Hat Enterprise Linux ES (v. 3 ELS) - i386\n\n3. Description:\n\nThe Dynamic Host Configuration Protocol (DHCP) is a protocol that allows\nindividual devices on an IP network to get their own network configuration\ninformation, including an IP address, a subnet mask, and a broadcast\naddress. A malicious DHCP server could send such an option\nwith a specially-crafted value to a DHCP client. If this option\u0027s value was\nsaved on the client system, and then later insecurely evaluated by a\nprocess that assumes the option is trusted, it could lead to arbitrary code\nexecution with the privileges of that process. (CVE-2011-0997)\n\nRed Hat would like to thank Sebastian Krahmer of the SuSE Security Team for\nreporting this issue. \n\nAll dhclient users should upgrade to these updated packages, which contain\na backported patch to correct this issue. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n689832 - CVE-2011-0997 dhclient: insufficient sanitization of certain DHCP response values\n\n6. Package List:\n\nRed Hat Enterprise Linux AS (v. 3 ELS):\n\nSource:\ndhcp-3.0.1-10.3_EL3.src.rpm\n\ni386:\ndhclient-3.0.1-10.3_EL3.i386.rpm\ndhcp-3.0.1-10.3_EL3.i386.rpm\ndhcp-debuginfo-3.0.1-10.3_EL3.i386.rpm\ndhcp-devel-3.0.1-10.3_EL3.i386.rpm\n\nRed Hat Enterprise Linux ES (v. 3 ELS):\n\nSource:\ndhcp-3.0.1-10.3_EL3.src.rpm\n\ni386:\ndhclient-3.0.1-10.3_EL3.i386.rpm\ndhcp-3.0.1-10.3_EL3.i386.rpm\ndhcp-debuginfo-3.0.1-10.3_EL3.i386.rpm\ndhcp-devel-3.0.1-10.3_EL3.i386.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and \ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2011-0997.html\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u0026lt;secalert@redhat.com\u0026gt;. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2011 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFN5QSLXlSAg2UNWIIRAsdVAJ9mkD7RcbzsYOkK8JnEQsRSeelYuwCeNmZd\nLdK24/RBkJXiFOiY5pI8Eig=\n=HTuE\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.3-6ubuntu7.2.diff.gz\n Size/MD5: 68426 b4a36d1b44e8276211cef0b9bfbb6ea5\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.3-6ubuntu7.2.dsc\n Size/MD5: 1428 2fe76544defdfa3d4ab61d548ea5bc03\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.3.orig.tar.gz\n Size/MD5: 870240 f91416a0b8ed3fd0601688cf0b7df58f\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.3-6ubuntu7.2_amd64.deb\n Size/MD5: 221524 2cc3c7815cb6e6a2cc21d0c2a6286202\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.3-6ubuntu7.2_amd64.deb\n Size/MD5: 454060 4d6e00d001d85359af4777316c012038\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.3-6ubuntu7.2_amd64.deb\n Size/MD5: 131252 bf862b9ce2cc9888f9e617f42c0d8f77\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.3-6ubuntu7.2_amd64.deb\n Size/MD5: 321024 383390887daadd122e7e66a9896e0432\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-client-udeb_3.0.3-6ubuntu7.2_amd64.udeb\n Size/MD5: 177440 04a6bc2b53da66245b8b79b71d8f82ed\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.3-6ubuntu7.2_amd64.deb\n Size/MD5: 105842 9616c95d8f2d487fd330fb9b33c58474\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.3-6ubuntu7.2_i386.deb\n Size/MD5: 196930 ebaee96958395481e8c9c25a6591c1a3\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.3-6ubuntu7.2_i386.deb\n Size/MD5: 431162 6fec8eaee0c753e95193f507e3c2c1eb\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.3-6ubuntu7.2_i386.deb\n Size/MD5: 117544 76fd573dc96ade71033c31e9965a1ede\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.3-6ubuntu7.2_i386.deb\n Size/MD5: 289684 8d0c386dc142ca3e69766e26fa6ced00\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-client-udeb_3.0.3-6ubuntu7.2_i386.udeb\n Size/MD5: 152296 98cdda8ba797a8f3532e2db2c95f5329\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.3-6ubuntu7.2_i386.deb\n Size/MD5: 94176 369f369a8fd6b58df3e293a5264c8047\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.3-6ubuntu7.2_powerpc.deb\n Size/MD5: 203612 da623d9e1694169cfc1de56f2e0df6e4\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.3-6ubuntu7.2_powerpc.deb\n Size/MD5: 435818 a6f18c0a5083885f0f3ad270a52f1ea9\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.3-6ubuntu7.2_powerpc.deb\n Size/MD5: 130290 8ed50d04b1c91276b0bdf19b3cda3fcd\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.3-6ubuntu7.2_powerpc.deb\n Size/MD5: 297742 95b7742e4fb7c4720add03965ef51b45\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-client-udeb_3.0.3-6ubuntu7.2_powerpc.udeb\n Size/MD5: 158466 61e6403a4a5db1783c43fbfe6ad74e8c\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.3-6ubuntu7.2_powerpc.deb\n Size/MD5: 96696 a7d275b7895e47d8141fab29a3db415b\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.3-6ubuntu7.2_sparc.deb\n Size/MD5: 200826 04fe774f2349b12af88465a96a4443b4\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.3-6ubuntu7.2_sparc.deb\n Size/MD5: 434238 c71c8b52f5324385d13e3610e7bef30e\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.3-6ubuntu7.2_sparc.deb\n Size/MD5: 126784 ca67a9bd308dfb73bf85906f53e8ae6b\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.3-6ubuntu7.2_sparc.deb\n Size/MD5: 294084 628696dfa6a0c9a2713b7fde4390d700\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-client-udeb_3.0.3-6ubuntu7.2_sparc.udeb\n Size/MD5: 156068 907d41b490e6155c580b83cec96e3f71\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.3-6ubuntu7.2_sparc.deb\n Size/MD5: 96810 d1559518c2fc467cf6244ee8cd29176b\n\nUpdated packages for Ubuntu 8.04 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.6.dfsg-1ubuntu9.2.diff.gz\n Size/MD5: 97783 a2e0e7077df662a15c039c462ecd8e3d\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.6.dfsg-1ubuntu9.2.dsc\n Size/MD5: 1537 ccf77a9747dc8cbc6b65e0d94ab9c43b\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.6.dfsg.orig.tar.gz\n Size/MD5: 724045 e89ef34005c576ddbb229e3b4478f6e2\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.0.6.dfsg-1ubuntu9.2_amd64.udeb\n Size/MD5: 180140 9b8c326a22be742b43e2b8d9b07d4f86\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.6.dfsg-1ubuntu9.2_amd64.deb\n Size/MD5: 242126 8053c2330e512d48f0318af10079c50a\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.6.dfsg-1ubuntu9.2_amd64.deb\n Size/MD5: 300696 15bbfae5ba97f27d0c896b886773f02b\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.6.dfsg-1ubuntu9.2_amd64.deb\n Size/MD5: 124032 82fe33e521c7ee08b7a00596acc8cb8d\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.6.dfsg-1ubuntu9.2_amd64.deb\n Size/MD5: 342596 40acd4d59e72be79a5c930254bee0223\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.6.dfsg-1ubuntu9.2_amd64.deb\n Size/MD5: 114396 5e5c7a86cec5ef70f927cbf53fffec4d\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.0.6.dfsg-1ubuntu9.2_i386.udeb\n Size/MD5: 159988 7c2cd082adad4cdae500b88b9429ea24\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.6.dfsg-1ubuntu9.2_i386.deb\n Size/MD5: 221966 92748d084525779ad31fe09ae76ca8d5\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.6.dfsg-1ubuntu9.2_i386.deb\n Size/MD5: 281564 0e64a350c9599b473f42949dbaa44533\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.6.dfsg-1ubuntu9.2_i386.deb\n Size/MD5: 109818 5ef8d14534865cdf0b63699e54ab684a\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.6.dfsg-1ubuntu9.2_i386.deb\n Size/MD5: 318748 205746468ea8d58f1babe96c28f46983\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.6.dfsg-1ubuntu9.2_i386.deb\n Size/MD5: 103376 15e19ab3867304e29f59f3e97170f145\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.0.6.dfsg-1ubuntu9.2_lpia.udeb\n Size/MD5: 158248 1ce010480a0ea9a1a8683995ab5c9b68\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.0.6.dfsg-1ubuntu9.2_lpia.deb\n Size/MD5: 220236 d0c1551dde51da5503fe3be6288a23bb\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.0.6.dfsg-1ubuntu9.2_lpia.deb\n Size/MD5: 279790 cf35fa8aaca649fd85366e684628a580\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.0.6.dfsg-1ubuntu9.2_lpia.deb\n Size/MD5: 109062 d1ff75192f05906028ac9001483529da\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.0.6.dfsg-1ubuntu9.2_lpia.deb\n Size/MD5: 316576 6f95deb3879a7c38c0f9cd1ba1ff0228\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.0.6.dfsg-1ubuntu9.2_lpia.deb\n Size/MD5: 102310 d4b1c32f8c1d1a6383fc09580e46ec79\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.0.6.dfsg-1ubuntu9.2_powerpc.udeb\n Size/MD5: 177278 29a10d5d08bc3797b67770a4028758ff\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.0.6.dfsg-1ubuntu9.2_powerpc.deb\n Size/MD5: 242046 27324a8f5623a94ff813148a5267fb4b\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.0.6.dfsg-1ubuntu9.2_powerpc.deb\n Size/MD5: 296498 4b8af066dc6c2481e4ff360800c04e74\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.0.6.dfsg-1ubuntu9.2_powerpc.deb\n Size/MD5: 122548 9ad8db4fbd23f1760d1bc123b01f014b\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.0.6.dfsg-1ubuntu9.2_powerpc.deb\n Size/MD5: 341860 28075deaecbdc1d77166dcb1623a8c85\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.0.6.dfsg-1ubuntu9.2_powerpc.deb\n Size/MD5: 112934 766413326d6486146da4aec03a2654bc\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.0.6.dfsg-1ubuntu9.2_sparc.udeb\n Size/MD5: 156574 742d54969d6dd68e7ac86ca00e1b1832\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.0.6.dfsg-1ubuntu9.2_sparc.deb\n Size/MD5: 218754 60013fe472200e1bf45d9b02d80a244e\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.0.6.dfsg-1ubuntu9.2_sparc.deb\n Size/MD5: 277066 bf1034124c51ddacf732c2887957a46e\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.0.6.dfsg-1ubuntu9.2_sparc.deb\n Size/MD5: 113494 b50639e27d92c0ababba9fab23242d7d\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.0.6.dfsg-1ubuntu9.2_sparc.deb\n Size/MD5: 313426 b93d5ec9d7ea9717a79d6bf2bb80a285\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.0.6.dfsg-1ubuntu9.2_sparc.deb\n Size/MD5: 102930 df99654fbd9e6f5aba7f962adb9d6470\n\nUpdated packages for Ubuntu 9.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.2-1ubuntu7.2.diff.gz\n Size/MD5: 141611 0cab5bee752928f3c9f0c8e1ded26167\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.2-1ubuntu7.2.dsc\n Size/MD5: 1955 a26905456538cd0d30e924e488302fc4\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.2.orig.tar.gz\n Size/MD5: 799626 85901a9554650030df7d1ef3e5959fdf\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp-client_3.1.2-1ubuntu7.2_all.deb\n Size/MD5: 26206 905e286082551fcbc23916052de7e2fa\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_amd64.udeb\n Size/MD5: 208604 5bb8643607d5f416205174f97d443e8e\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_amd64.deb\n Size/MD5: 270930 fa0267775f2471f0be30499bf121b6e7\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_amd64.deb\n Size/MD5: 332152 ee101e67b7ad97bd410e983da115484d\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_amd64.deb\n Size/MD5: 127130 0d4b4a1dc992d56f8c01d94990290910\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_amd64.deb\n Size/MD5: 395062 a5ab658903283a97dd658e5cdfe6a45e\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_amd64.deb\n Size/MD5: 125444 6f12bfb86b46567aa8e2ecba8af1852e\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_amd64.deb\n Size/MD5: 348242 8fe33e4a7afac6d5a952d0c158d7ed45\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_i386.udeb\n Size/MD5: 191210 64285abd7e68c517eefcf3ff5eecb909\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_i386.deb\n Size/MD5: 252916 749769cec2a5d0cdfe5ddb67e6864270\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_i386.deb\n Size/MD5: 315850 e0deb4932a763831adc3e73cf0f068fa\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_i386.deb\n Size/MD5: 116650 434d9e26a1b3b5a4b5fd94bea2c581b4\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_i386.deb\n Size/MD5: 372288 481d9d80e948895969b72be4b825fbb8\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_i386.deb\n Size/MD5: 116424 49010850bef64719353588c5d88e6714\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_i386.deb\n Size/MD5: 326174 7f328cba4c811d5d56582328f1ad6b1d\n\n armel architecture (ARM Architecture):\n\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_armel.udeb\n Size/MD5: 174400 4ed674aa3f13c4c4012def78b6cfd62f\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_armel.deb\n Size/MD5: 236228 c14a8f75dc70e363afb2e39b9b6c9b68\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_armel.deb\n Size/MD5: 300026 8183f7371713d8ddc8bd2b8f8d979794\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_armel.deb\n Size/MD5: 112806 41dcceea5abd7feac4f1f7465b3892b7\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_armel.deb\n Size/MD5: 349366 ea2f47d49b065c252caeb33d9d273363\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_armel.deb\n Size/MD5: 108672 f277fadf0e50c5325b20f8001f30108a\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_armel.deb\n Size/MD5: 301210 76887fde4612e80131c94a00b328a874\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_lpia.udeb\n Size/MD5: 187330 e70af0ba0633b7a10c666f2f2e30b017\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_lpia.deb\n Size/MD5: 249154 bde848f0444ac204f0781d848771b2e7\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_lpia.deb\n Size/MD5: 312056 e131e50d9159fb5a7cf92bd7532c6d5b\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_lpia.deb\n Size/MD5: 115610 6bf9bc6ccc3986f7bda77f6e0929bd2b\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_lpia.deb\n Size/MD5: 368276 a5d4ce07f31b702817fb3d3961fd8a7b\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_lpia.deb\n Size/MD5: 114588 d030b6a51bf6eb1b682c88fcfc92cdda\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_lpia.deb\n Size/MD5: 321710 5c51aac0b4ea78167072cce854d63f47\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_powerpc.udeb\n Size/MD5: 199998 aff548b71963695089f418a502bc5e01\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_powerpc.deb\n Size/MD5: 262344 a4799a7b4c6d6d91120ef36537485080\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_powerpc.deb\n Size/MD5: 324014 c6be94d8dda2d47ea08c3f1277160eda\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_powerpc.deb\n Size/MD5: 120394 4b35e8aa5a363a659daa6232a0a76501\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_powerpc.deb\n Size/MD5: 382434 9c71333d4f8ccc12d14996fa42ba60b7\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_powerpc.deb\n Size/MD5: 120310 32c5affaeb955349a26cae2bd9c92236\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_powerpc.deb\n Size/MD5: 335902 5460f8f32a30489940cf69855983ed3c\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_sparc.udeb\n Size/MD5: 203458 038c030a32c3d74e3d20cb4f8eaf5336\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_sparc.deb\n Size/MD5: 265862 67e06c4f7f5352a3248060245f41837c\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_sparc.deb\n Size/MD5: 324634 873eeaf81f86f69e1de8f2c9c2335fda\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_sparc.deb\n Size/MD5: 116874 4583b6c0cd5cf6abf8fc81ae1c5656a2\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_sparc.deb\n Size/MD5: 387388 d31379a7fe21d36761ce6d6e01d51ba7\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_sparc.deb\n Size/MD5: 121616 62ed8721ad7cfe9f45448c321be12340\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_sparc.deb\n Size/MD5: 341160 9e72b31fccc6ca7d33fcf814f7cca8be\n\nUpdated packages for Ubuntu 10.04 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.3-2ubuntu3.1.diff.gz\n Size/MD5: 145049 762c8d99c1e8e1245830ff0cfc9c22cf\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.3-2ubuntu3.1.dsc\n Size/MD5: 1950 6fc0ed0a5f2f2897b25cb127fdf599bb\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.3.orig.tar.gz\n Size/MD5: 804097 6ee8af8b283c95b3b4db5e88b6dd9a26\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp-client_3.1.3-2ubuntu3.1_all.deb\n Size/MD5: 27294 5873371bf57e765fd69a49ab238f7f5f\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu3.1_amd64.udeb\n Size/MD5: 208924 47388e6df5a8a88758f893f0157f7a49\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu3.1_amd64.deb\n Size/MD5: 273438 3e968127e7212b682e23422ccd498a51\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu3.1_amd64.deb\n Size/MD5: 335524 c2231ce6ce81fa1a61f33b50879ea8e7\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu3.1_amd64.deb\n Size/MD5: 127748 31baa39d20b53e7200b146bb5e1dbc7a\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu3.1_amd64.deb\n Size/MD5: 396594 05f2652d1223dbbf59bcfdb86503ec81\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu3.1_amd64.deb\n Size/MD5: 126830 2017ee773f9e4c4136e6604003978a72\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu3.1_amd64.deb\n Size/MD5: 349758 3a07e9f0c5b36e05024e98f2e01e7a36\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu3.1_i386.udeb\n Size/MD5: 191468 7efe2e4b59392afda8ef1c8d69aa04cd\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu3.1_i386.deb\n Size/MD5: 256600 1b24883c7ee056fcbcda20cc1d82673e\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu3.1_i386.deb\n Size/MD5: 318512 8ad3080333f5d86ad40548de9cfced43\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu3.1_i386.deb\n Size/MD5: 118816 c679db32ae992ca9f6fc5473e81df94a\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu3.1_i386.deb\n Size/MD5: 376744 e3b708777fcd15c84240e43bf08b5d7e\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu3.1_i386.deb\n Size/MD5: 117698 b0dfb728d6d9f69c9af3910744b1fbb8\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu3.1_i386.deb\n Size/MD5: 328168 617edc965494055443d2c43326c411d7\n\n armel architecture (ARM Architecture):\n\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu3.1_armel.udeb\n Size/MD5: 180926 3969ae580d52c38b45d63ac388cbbe4d\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu3.1_armel.deb\n Size/MD5: 246116 4956ee0ca5be72ee8ece1cd89ccf5082\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu3.1_armel.deb\n Size/MD5: 309348 c8567f86659a5670b6c7167a106bf71a\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu3.1_armel.deb\n Size/MD5: 115350 023f49615f6ca0a8f2367e816921fa8d\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu3.1_armel.deb\n Size/MD5: 361242 b8e92e0d7ee35dccf62349627513b3d5\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu3.1_armel.deb\n Size/MD5: 113136 ecc1eca1107bf3d2a85145c87800f0a9\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu3.1_armel.deb\n Size/MD5: 314078 a09784b9e5545593b771e8db596b70ad\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu3.1_powerpc.udeb\n Size/MD5: 200432 0db5e288252f7cec9511aeedd6328a87\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu3.1_powerpc.deb\n Size/MD5: 265410 78eb3d25b509d5d3669a33bf8603b0df\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu3.1_powerpc.deb\n Size/MD5: 327180 9d47f9f6bd35ebd5e53e68ff8cf27473\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu3.1_powerpc.deb\n Size/MD5: 121552 7d955d50534795154e471aea30341fe1\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu3.1_powerpc.deb\n Size/MD5: 385370 dd7f5ffd85a725a8cb4f8fe6a067d0bb\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu3.1_powerpc.deb\n Size/MD5: 121446 0ccdd1ca74fcd96be84596ce324f967e\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu3.1_powerpc.deb\n Size/MD5: 337410 54549752057dc73a3e35a158b871ea36\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu3.1_sparc.udeb\n Size/MD5: 212712 be3c531c2fffd6ad83501e44015a3532\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu3.1_sparc.deb\n Size/MD5: 277974 5a9ee5790cc705c845cd085c71d001b5\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu3.1_sparc.deb\n Size/MD5: 335174 22b404e90f206772c786f968392ecef1\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu3.1_sparc.deb\n Size/MD5: 121764 97643d01dd5dd3eb06859cb881312e6d\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu3.1_sparc.deb\n Size/MD5: 402564 889e3a0882bebb5b4ceb4df3c805d883\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu3.1_sparc.deb\n Size/MD5: 126888 546ab5281e2ba4672471a30fce814e36\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu3.1_sparc.deb\n Size/MD5: 353712 64fcbf89ca8fd7af9aa2a9bd66739170\n\nUpdated packages for Ubuntu 10.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.3-2ubuntu6.1.diff.gz\n Size/MD5: 151417 604106743c8429a59b9b8af55de854f7\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.3-2ubuntu6.1.dsc\n Size/MD5: 1962 792f947b2a6c3020c45ca1b56771c77e\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.3.orig.tar.gz\n Size/MD5: 804097 6ee8af8b283c95b3b4db5e88b6dd9a26\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp-client_3.1.3-2ubuntu6.1_all.deb\n Size/MD5: 27778 319b0ce429e455b13a2248cc2cbe3491\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu6.1_amd64.udeb\n Size/MD5: 208588 f4d4d2a63016b2b9960654be7c04b9c5\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu6.1_amd64.deb\n Size/MD5: 274192 4005626ae7c8ed06bf15a1e014968ebd\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu6.1_amd64.deb\n Size/MD5: 335392 3f745248ea2b2c54e1771f1789cd13dc\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu6.1_amd64.deb\n Size/MD5: 128922 dc2dd29ead86d887a22da63f27ae9692\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu6.1_amd64.deb\n Size/MD5: 398270 ffd780e99cb19cc3884703ec930a68cb\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu6.1_amd64.deb\n Size/MD5: 126752 a4d3f03e0855ce6ef4cf6a75f33198d1\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu6.1_amd64.deb\n Size/MD5: 349942 430e5e501488da92c3b4e2f2a685912a\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu6.1_i386.udeb\n Size/MD5: 190312 23ced3137d0e056d9ce13dd41e656af3\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu6.1_i386.deb\n Size/MD5: 255768 07cfc1c5db7b6d8585e9a00513699049\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu6.1_i386.deb\n Size/MD5: 317854 f9a58ae40c5f2645e17e2a9349f07edf\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu6.1_i386.deb\n Size/MD5: 119094 9af94d26ecd3ce03c9d059ab8db5ff46\n http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu6.1_i386.deb\n Size/MD5: 376052 2dd5ab42f28d13baab1d332c92fcdbcf\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu6.1_i386.deb\n Size/MD5: 117472 9638997daef5f353621a3adea0f054d5\n http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu6.1_i386.deb\n Size/MD5: 327368 93d8a202391be7d55484901a7fa00f09\n\n armel architecture (ARM Architecture):\n\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu6.1_armel.udeb\n Size/MD5: 191162 ea1961dc40672d12302dcb3e0ae62c44\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu6.1_armel.deb\n Size/MD5: 256344 fd6d84d8ca333a1e0cc0efc4c26df7cb\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu6.1_armel.deb\n Size/MD5: 319110 4ed5fb07ce8a4997c1132f96e4c29e39\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu6.1_armel.deb\n Size/MD5: 118586 ade0a8cfa1217ae39ff58bea47e4faa0\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu6.1_armel.deb\n Size/MD5: 377976 7f26e7b4442f8b17b8178fc7b44e6720\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu6.1_armel.deb\n Size/MD5: 118802 ee96894319dbf620dbf981a2493cefa0\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu6.1_armel.deb\n Size/MD5: 328204 3a65c3fb55385716b19bbb6fce72ab07\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu6.1_powerpc.udeb\n Size/MD5: 199526 1a984e2503c1a015134cf94e273b768a\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu6.1_powerpc.deb\n Size/MD5: 264952 7a2139af6f6681dae88cd826c04ce61e\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu6.1_powerpc.deb\n Size/MD5: 326646 8a1aaf899283814de8b8bcca6125576d\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu6.1_powerpc.deb\n Size/MD5: 121952 90719742a1e133ae5edb9c5d6e72ad06\n http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu6.1_powerpc.deb\n Size/MD5: 384922 1cb9a8d40d9405b061b28cd2236d3acd\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu6.1_powerpc.deb\n Size/MD5: 121542 81b420f37a81e5a05e5aadeaf1cb47c3\n http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu6.1_powerpc.deb\n Size/MD5: 336918 26cba2f6096556526ce2a64556f571e5\n\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2011-0997" }, { "db": "CERT/CC", "id": "VU#107886" }, { "db": "JVNDB", "id": "JVNDB-2011-003066" }, { "db": "BID", "id": "47176" }, { "db": "VULMON", "id": "CVE-2011-0997" }, { "db": "PACKETSTORM", "id": "100277" }, { "db": "PACKETSTORM", "id": "119354" }, { "db": "PACKETSTORM", "id": "111029" }, { "db": "PACKETSTORM", "id": "106987" }, { "db": "PACKETSTORM", "id": "100583" }, { "db": "PACKETSTORM", "id": "101866" }, { "db": "PACKETSTORM", "id": "100298" } ], "trust": 3.33 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#107886", "trust": 3.0 }, { "db": "NVD", "id": "CVE-2011-0997", "trust": 2.9 }, { "db": "JUNIPER", "id": "JSA10761", "trust": 1.4 }, { "db": "BID", "id": "47176", "trust": 1.4 }, { "db": "VUPEN", "id": "ADV-2011-1000", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0909", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0915", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0926", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0965", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0879", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0886", "trust": 1.1 }, { "db": "SECUNIA", "id": "44103", "trust": 1.1 }, { "db": "SECUNIA", "id": "44127", "trust": 1.1 }, { "db": "SECUNIA", "id": "44037", "trust": 1.1 }, { "db": "SECUNIA", "id": "44048", "trust": 1.1 }, { "db": "SECUNIA", "id": "44180", "trust": 1.1 }, { "db": "SECUNIA", "id": "44089", "trust": 1.1 }, { "db": "SECUNIA", "id": "44090", "trust": 1.1 }, { "db": "SECTRACK", "id": "1025300", "trust": 1.1 }, { "db": "OSVDB", "id": "71493", "trust": 1.1 }, { "db": "EXPLOIT-DB", "id": "37623", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2011-003066", "trust": 0.8 }, { "db": "VULMON", "id": "CVE-2011-0997", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "100277", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "119354", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "111029", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "106987", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "100583", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "101866", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "100298", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#107886" }, { "db": "VULMON", "id": "CVE-2011-0997" }, { "db": "BID", "id": "47176" }, { "db": "JVNDB", "id": "JVNDB-2011-003066" }, { "db": "PACKETSTORM", "id": "100277" }, { "db": "PACKETSTORM", "id": "119354" }, { "db": "PACKETSTORM", "id": "111029" }, { "db": "PACKETSTORM", "id": "106987" }, { "db": "PACKETSTORM", "id": "100583" }, { "db": "PACKETSTORM", "id": "101866" }, { "db": "PACKETSTORM", "id": "100298" }, { "db": "NVD", "id": "CVE-2011-0997" } ] }, "id": "VAR-201104-0082", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.41252741 }, "last_update_date": "2024-07-23T21:30:23.564000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT5005", "trust": 0.8, "url": "http://support.apple.com/kb/ht5005" }, { "title": "Debian CVElist Bug Report Logs: isc-dhcp-client: CVE-2011-0997", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=a3bf1099a3f6410da5cb17491cb28710" }, { "title": "Ubuntu Security Notice: dhcp3 vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-1108-2" }, { "title": "Ubuntu Security Notice: dhcp3 vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-1108-1" }, { "title": "Debian Security Advisories: DSA-2216-1 isc-dhcp -- missing input sanitization", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=9079594e67dfba2ce5fd90c652ce64af" }, { "title": "Debian CVElist Bug Report Logs: CVE-2011-2716 udhcpc insufficient checking of DHCP options", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=d937c5addcd54815f7f0480b4b3a55e2" }, { "title": "VMware Security Advisories: VMware ESX third party updates for Service Console packages glibc and dhcp", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=386db0c9014e75eeed9029418ea6714f" }, { "title": "Citrix Security Bulletins: Archive: Citrix XenServer Multiple Security Updates", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=30a988053a9b9c888e66371d7b3040f2" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/critical-rce-bug-avaya-voip-phones/147122/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/avaya-voip-phones-harbored-10-year-old-vulnerability/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2011-0997" }, { "db": "JVNDB", "id": "JVNDB-2011-003066" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-003066" }, { "db": "NVD", "id": "CVE-2011-0997" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.kb.cert.org/vuls/id/107886" }, { "trust": 1.5, "url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997" }, { "trust": 1.2, "url": "http://security.gentoo.org/glsa/glsa-201301-06.xml" }, { "trust": 1.1, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10761" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-april/057888.html" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-april/058279.html" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2" }, { "trust": 1.1, "url": "http://secunia.com/advisories/44037" }, { "trust": 1.1, "url": "http://secunia.com/advisories/44048" }, { "trust": 1.1, "url": "http://secunia.com/advisories/44089" }, { "trust": 1.1, "url": "http://secunia.com/advisories/44090" }, { "trust": 1.1, "url": "http://secunia.com/advisories/44103" }, { "trust": 1.1, "url": "http://secunia.com/advisories/44127" }, { "trust": 1.1, "url": "http://secunia.com/advisories/44180" }, { "trust": 1.1, "url": "http://securitytracker.com/id?1025300" }, { "trust": 1.1, "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345" }, { "trust": 1.1, "url": "http://www.debian.org/security/2011/dsa-2216" }, { "trust": 1.1, "url": "http://www.debian.org/security/2011/dsa-2217" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2011:073" }, { "trust": 1.1, "url": "http://www.osvdb.org/71493" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2011-0428.html" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2011-0840.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/47176" }, { "trust": 1.1, "url": "http://www.ubuntu.com/usn/usn-1108-1" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0879" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0886" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0909" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0915" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0926" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0965" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/1000" }, { "trust": 1.1, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66580" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12812" }, { "trust": 1.1, "url": "https://www.exploit-db.com/exploits/37623/" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0997" }, { "trust": 0.8, "url": "about vulnerability notes" }, { "trust": 0.8, "url": "contact us about this vulnerability" }, { "trust": 0.8, "url": "provide a vendor statement" }, { "trust": 0.8, "url": "https://jvn.jp/cert/jvnvu107886/" }, { "trust": 0.8, "url": "https://jvn.jp/cert/jvnvu309451/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0997" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0997" }, { "trust": 0.3, "url": "http://lists.apple.com/archives/security-announce/2011/nov/msg00002.html" }, { "trust": 0.3, "url": "https://www.isc.org/software/dhcp" }, { "trust": 0.3, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10761\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100143367" }, { "trust": 0.3, "url": "http://support.citrix.com/article/ctx130325" }, { "trust": 0.3, "url": "http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2011-005.txt.asc" }, { "trust": 0.3, "url": "http://lists.vmware.com/pipermail/security-announce/2011/000142.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621099" }, { "trust": 0.1, "url": "https://www.rapid7.com/db/vulnerabilities/linuxrpm-rhsa-2011-0428" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/1108-2/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://store.mandriva.com/product_info.php?cpath=149\u0026amp;products_id=490" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://ftp.isc.org/isc/dhcp/dhcp-4.1.2-p1-relnotes" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2748" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0997" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3955" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3571" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3954" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4539" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3570" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4868" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3954" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4539" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2749" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2749" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3570" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3955" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3571" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2748" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4868" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3207" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3210" }, { "trust": 0.1, "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.1, "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c02964430" }, { "trust": 0.1, "url": "http://h18004.www1.hp.com/products/servers/management/insightcontrol_linux2/index.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0762" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1097" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4645" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dhcp3/3.1.3-2ubuntu6.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dhcp3/3.1.3-2ubuntu3.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dhcp3/3.1.2-1ubuntu7.3" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-0997.html" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2011-0840.html" }, { "trust": 0.1, "url": "https://access.redhat.com/kb/docs/doc-11259" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.3-6ubuntu7.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.0.6.dfsg-1ubuntu9.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.0.6.dfsg-1ubuntu9.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.0.6.dfsg-1ubuntu9.2_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.3-6ubuntu7.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_lpia.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu6.1_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.3-6ubuntu7.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp-client_3.1.2-1ubuntu7.2_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu6.1_armel.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu6.1_armel.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu3.1_armel.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_armel.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.3-2ubuntu6.1.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.3-6ubuntu7.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.3-6ubuntu7.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_armel.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.0.6.dfsg-1ubuntu9.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.3-6ubuntu7.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.3-6ubuntu7.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu3.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_armel.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.3-6ubuntu7.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.6.dfsg-1ubuntu9.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu6.1_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.0.6.dfsg-1ubuntu9.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.3-6ubuntu7.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.3-6ubuntu7.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.2-1ubuntu7.2.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu3.1_armel.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.6.dfsg-1ubuntu9.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.3-6ubuntu7.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.6.dfsg-1ubuntu9.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.0.6.dfsg-1ubuntu9.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu3.1_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.3-6ubuntu7.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-client-udeb_3.0.3-6ubuntu7.2_i386.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.0.6.dfsg-1ubuntu9.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.6.dfsg-1ubuntu9.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.6.dfsg-1ubuntu9.2.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.6.dfsg-1ubuntu9.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.2.orig.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.3-6ubuntu7.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.3-6ubuntu7.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu3.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu3.1_armel.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-client-udeb_3.0.3-6ubuntu7.2_powerpc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp-client_3.1.3-2ubuntu3.1_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu6.1_armel.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.0.6.dfsg-1ubuntu9.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu3.1_armel.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu3.1_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_armel.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.3-6ubuntu7.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu3.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu6.1_armel.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.0.6.dfsg-1ubuntu9.2_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu3.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu3.1_armel.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.2-1ubuntu7.2.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_armel.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.3-6ubuntu7.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu3.1_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.0.6.dfsg-1ubuntu9.2_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.3-6ubuntu7.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.0.6.dfsg-1ubuntu9.2_powerpc.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_armel.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.6.dfsg-1ubuntu9.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.3-2ubuntu3.1.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu3.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu3.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.0.6.dfsg-1ubuntu9.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.0.6.dfsg-1ubuntu9.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.3-6ubuntu7.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu3.1_armel.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.3-6ubuntu7.2.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu3.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.0.6.dfsg-1ubuntu9.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.0.6.dfsg-1ubuntu9.2_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.0.6.dfsg-1ubuntu9.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.0.6.dfsg-1ubuntu9.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.2-1ubuntu7.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu3.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu6.1_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.0.3-6ubuntu7.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.0.6.dfsg-1ubuntu9.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.3-2ubuntu6.1.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.2-1ubuntu7.2_armel.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu3.1_amd64.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu3.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.3.orig.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.0.6.dfsg-1ubuntu9.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.0.6.dfsg-1ubuntu9.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu3.1_armel.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-server_3.1.2-1ubuntu7.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu6.1_armel.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu3.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu3.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.3.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.0.6.dfsg-1ubuntu9.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-client-udeb_3.0.3-6ubuntu7.2_amd64.udeb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.2-1ubuntu7.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.6.dfsg.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.6.dfsg-1ubuntu9.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.0.3-6ubuntu7.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.0.6.dfsg-1ubuntu9.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.3-2ubuntu6.1_armel.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu3.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp-client_3.1.3-2ubuntu6.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.1.3-2ubuntu3.1.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.6.dfsg-1ubuntu9.2.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-client-udeb_3.0.3-6ubuntu7.2_sparc.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-client-udeb_3.1.2-1ubuntu7.2_i386.udeb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-common_3.1.3-2ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-client_3.1.3-2ubuntu3.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-relay_3.1.3-2ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu6.1_armel.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3-dev_3.1.3-2ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-dev_3.0.6.dfsg-1ubuntu9.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/d/dhcp3/dhcp3-relay_3.1.2-1ubuntu7.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/d/dhcp3/dhcp3_3.0.3-6ubuntu7.2.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/d/dhcp3/dhcp3-server-ldap_3.1.3-2ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-common_3.1.2-1ubuntu7.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/d/dhcp3/dhcp3-server_3.1.3-2ubuntu3.1_powerpc.deb" } ], "sources": [ { "db": "CERT/CC", "id": "VU#107886" }, { "db": "VULMON", "id": "CVE-2011-0997" }, { "db": "BID", "id": "47176" }, { "db": "JVNDB", "id": "JVNDB-2011-003066" }, { "db": "PACKETSTORM", "id": "100277" }, { "db": "PACKETSTORM", "id": "119354" }, { "db": "PACKETSTORM", "id": "111029" }, { "db": "PACKETSTORM", "id": "106987" }, { "db": "PACKETSTORM", "id": "100583" }, { "db": "PACKETSTORM", "id": "101866" }, { "db": "PACKETSTORM", "id": "100298" }, { "db": "NVD", "id": "CVE-2011-0997" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#107886" }, { "db": "VULMON", "id": "CVE-2011-0997" }, { "db": "BID", "id": "47176" }, { "db": "JVNDB", "id": "JVNDB-2011-003066" }, { "db": "PACKETSTORM", "id": "100277" }, { "db": "PACKETSTORM", "id": "119354" }, { "db": "PACKETSTORM", "id": "111029" }, { "db": "PACKETSTORM", "id": "106987" }, { "db": "PACKETSTORM", "id": "100583" }, { "db": "PACKETSTORM", "id": "101866" }, { "db": "PACKETSTORM", "id": "100298" }, { "db": "NVD", "id": "CVE-2011-0997" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-04-05T00:00:00", "db": "CERT/CC", "id": "VU#107886" }, { "date": "2011-04-08T00:00:00", "db": "VULMON", "id": "CVE-2011-0997" }, { "date": "2011-04-05T00:00:00", "db": "BID", "id": "47176" }, { "date": "2011-11-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003066" }, { "date": "2011-04-11T15:09:06", "db": "PACKETSTORM", "id": "100277" }, { "date": "2013-01-09T02:26:37", "db": "PACKETSTORM", "id": "119354" }, { "date": "2012-03-21T01:19:12", "db": "PACKETSTORM", "id": "111029" }, { "date": "2011-11-15T05:14:36", "db": "PACKETSTORM", "id": "106987" }, { "date": "2011-04-19T19:28:20", "db": "PACKETSTORM", "id": "100583" }, { "date": "2011-06-01T06:03:01", "db": "PACKETSTORM", "id": "101866" }, { "date": "2011-04-12T00:00:41", "db": "PACKETSTORM", "id": "100298" }, { "date": "2011-04-08T15:17:27.387000", "db": "NVD", "id": "CVE-2011-0997" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-05-06T00:00:00", "db": "CERT/CC", "id": "VU#107886" }, { "date": "2020-04-01T00:00:00", "db": "VULMON", "id": "CVE-2011-0997" }, { "date": "2016-10-26T09:06:00", "db": "BID", "id": "47176" }, { "date": "2011-11-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-003066" }, { "date": "2020-04-01T13:07:53.590000", "db": "NVD", "id": "CVE-2011-0997" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "47176" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ISC dhclient vulnerability", "sources": [ { "db": "CERT/CC", "id": "VU#107886" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "47176" } ], "trust": 0.3 } }
rhsa-2011_0840
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated dhcp packages that fix one security issue are now available for\nRed Hat Enterprise Linux 3 Extended Life Cycle Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows\nindividual devices on an IP network to get their own network configuration\ninformation, including an IP address, a subnet mask, and a broadcast\naddress.\n\nIt was discovered that the DHCP client daemon, dhclient, did not\nsufficiently sanitize certain options provided in DHCP server replies, such\nas the client hostname. A malicious DHCP server could send such an option\nwith a specially-crafted value to a DHCP client. If this option\u0027s value was\nsaved on the client system, and then later insecurely evaluated by a\nprocess that assumes the option is trusted, it could lead to arbitrary code\nexecution with the privileges of that process. (CVE-2011-0997)\n\nRed Hat would like to thank Sebastian Krahmer of the SuSE Security Team for\nreporting this issue.\n\nAll dhclient users should upgrade to these updated packages, which contain\na backported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0840", "url": "https://access.redhat.com/errata/RHSA-2011:0840" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "689832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0840.json" } ], "title": "Red Hat Security Advisory: dhcp security update", "tracking": { "current_release_date": "2024-11-22T04:17:08+00:00", "generator": { "date": "2024-11-22T04:17:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0840", "initial_release_date": "2011-05-31T14:48:00+00:00", "revision_history": [ { "date": "2011-05-31T14:48:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-05-31T10:52:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:17:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (v. 3 ELS)", "product": { "name": "Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:3::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES (v. 3 ELS)", "product": { "name": "Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:3::es" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dhclient-7:3.0.1-10.3_EL3.i386", "product": { "name": "dhclient-7:3.0.1-10.3_EL3.i386", "product_id": "dhclient-7:3.0.1-10.3_EL3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhclient@3.0.1-10.3_EL3?arch=i386\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-7:3.0.1-10.3_EL3.i386", "product": { "name": "dhcp-7:3.0.1-10.3_EL3.i386", "product_id": "dhcp-7:3.0.1-10.3_EL3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@3.0.1-10.3_EL3?arch=i386\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-debuginfo-7:3.0.1-10.3_EL3.i386", "product": { "name": "dhcp-debuginfo-7:3.0.1-10.3_EL3.i386", "product_id": "dhcp-debuginfo-7:3.0.1-10.3_EL3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.1-10.3_EL3?arch=i386\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-devel-7:3.0.1-10.3_EL3.i386", "product": { "name": "dhcp-devel-7:3.0.1-10.3_EL3.i386", "product_id": "dhcp-devel-7:3.0.1-10.3_EL3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@3.0.1-10.3_EL3?arch=i386\u0026epoch=7" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "dhcp-7:3.0.1-10.3_EL3.src", "product": { "name": "dhcp-7:3.0.1-10.3_EL3.src", "product_id": "dhcp-7:3.0.1-10.3_EL3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@3.0.1-10.3_EL3?arch=src\u0026epoch=7" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-10.3_EL3.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:dhclient-7:3.0.1-10.3_EL3.i386" }, "product_reference": "dhclient-7:3.0.1-10.3_EL3.i386", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-10.3_EL3.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:dhcp-7:3.0.1-10.3_EL3.i386" }, "product_reference": "dhcp-7:3.0.1-10.3_EL3.i386", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-10.3_EL3.src as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:dhcp-7:3.0.1-10.3_EL3.src" }, "product_reference": "dhcp-7:3.0.1-10.3_EL3.src", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-10.3_EL3.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:dhcp-debuginfo-7:3.0.1-10.3_EL3.i386" }, "product_reference": "dhcp-debuginfo-7:3.0.1-10.3_EL3.i386", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-10.3_EL3.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:dhcp-devel-7:3.0.1-10.3_EL3.i386" }, "product_reference": "dhcp-devel-7:3.0.1-10.3_EL3.i386", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-10.3_EL3.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:dhclient-7:3.0.1-10.3_EL3.i386" }, "product_reference": "dhclient-7:3.0.1-10.3_EL3.i386", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-10.3_EL3.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:dhcp-7:3.0.1-10.3_EL3.i386" }, "product_reference": "dhcp-7:3.0.1-10.3_EL3.i386", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-10.3_EL3.src as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:dhcp-7:3.0.1-10.3_EL3.src" }, "product_reference": "dhcp-7:3.0.1-10.3_EL3.src", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-10.3_EL3.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:dhcp-debuginfo-7:3.0.1-10.3_EL3.i386" }, "product_reference": "dhcp-debuginfo-7:3.0.1-10.3_EL3.i386", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-10.3_EL3.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:dhcp-devel-7:3.0.1-10.3_EL3.i386" }, "product_reference": "dhcp-devel-7:3.0.1-10.3_EL3.i386", "relates_to_product_reference": "3ES-ELS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Sebastian Krahmer" ], "organization": "SuSE Security Team" } ], "cve": "CVE-2011-0997", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "discovery_date": "2011-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "689832" } ], "notes": [ { "category": "description", "text": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.", "title": "Vulnerability description" }, { "category": "summary", "text": "dhclient: insufficient sanitization of certain DHCP response values", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:dhclient-7:3.0.1-10.3_EL3.i386", "3AS-ELS:dhcp-7:3.0.1-10.3_EL3.i386", "3AS-ELS:dhcp-7:3.0.1-10.3_EL3.src", "3AS-ELS:dhcp-debuginfo-7:3.0.1-10.3_EL3.i386", "3AS-ELS:dhcp-devel-7:3.0.1-10.3_EL3.i386", "3ES-ELS:dhclient-7:3.0.1-10.3_EL3.i386", "3ES-ELS:dhcp-7:3.0.1-10.3_EL3.i386", "3ES-ELS:dhcp-7:3.0.1-10.3_EL3.src", "3ES-ELS:dhcp-debuginfo-7:3.0.1-10.3_EL3.i386", "3ES-ELS:dhcp-devel-7:3.0.1-10.3_EL3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0997" }, { "category": "external", "summary": "RHBZ#689832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0997", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0997" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0997", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0997" } ], "release_date": "2011-04-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-05-31T14:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "3AS-ELS:dhclient-7:3.0.1-10.3_EL3.i386", "3AS-ELS:dhcp-7:3.0.1-10.3_EL3.i386", "3AS-ELS:dhcp-7:3.0.1-10.3_EL3.src", "3AS-ELS:dhcp-debuginfo-7:3.0.1-10.3_EL3.i386", "3AS-ELS:dhcp-devel-7:3.0.1-10.3_EL3.i386", "3ES-ELS:dhclient-7:3.0.1-10.3_EL3.i386", "3ES-ELS:dhcp-7:3.0.1-10.3_EL3.i386", "3ES-ELS:dhcp-7:3.0.1-10.3_EL3.src", "3ES-ELS:dhcp-debuginfo-7:3.0.1-10.3_EL3.i386", "3ES-ELS:dhcp-devel-7:3.0.1-10.3_EL3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0840" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "3AS-ELS:dhclient-7:3.0.1-10.3_EL3.i386", "3AS-ELS:dhcp-7:3.0.1-10.3_EL3.i386", "3AS-ELS:dhcp-7:3.0.1-10.3_EL3.src", "3AS-ELS:dhcp-debuginfo-7:3.0.1-10.3_EL3.i386", "3AS-ELS:dhcp-devel-7:3.0.1-10.3_EL3.i386", "3ES-ELS:dhclient-7:3.0.1-10.3_EL3.i386", "3ES-ELS:dhcp-7:3.0.1-10.3_EL3.i386", "3ES-ELS:dhcp-7:3.0.1-10.3_EL3.src", "3ES-ELS:dhcp-debuginfo-7:3.0.1-10.3_EL3.i386", "3ES-ELS:dhcp-devel-7:3.0.1-10.3_EL3.i386" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dhclient: insufficient sanitization of certain DHCP response values" } ] }
rhsa-2011_0428
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated dhcp packages that fix one security issue are now available for\nRed Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows\nindividual devices on an IP network to get their own network configuration\ninformation, including an IP address, a subnet mask, and a broadcast\naddress.\n\nIt was discovered that the DHCP client daemon, dhclient, did not\nsufficiently sanitize certain options provided in DHCP server replies, such\nas the client hostname. A malicious DHCP server could send such an option\nwith a specially-crafted value to a DHCP client. If this option\u0027s value was\nsaved on the client system, and then later insecurely evaluated by a\nprocess that assumes the option is trusted, it could lead to arbitrary code\nexecution with the privileges of that process. (CVE-2011-0997)\n\nRed Hat would like to thank Sebastian Krahmer of the SuSE Security Team for\nreporting this issue.\n\nAll dhclient users should upgrade to these updated packages, which contain\na backported patch to correct this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0428", "url": "https://access.redhat.com/errata/RHSA-2011:0428" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "689832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0428.json" } ], "title": "Red Hat Security Advisory: dhcp security update", "tracking": { "current_release_date": "2024-11-22T04:17:03+00:00", "generator": { "date": "2024-11-22T04:17:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0428", "initial_release_date": "2011-04-08T14:38:00+00:00", "revision_history": [ { "date": "2011-04-08T14:38:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-04-08T10:39:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:17:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product": { "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "product": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "product_id": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@4.1.1-12.P1.el6_0.4?arch=i686\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "product": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "product_id": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@4.1.1-12.P1.el6_0.4?arch=i686\u0026epoch=12" } } }, { "category": "product_version", "name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686", "product": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686", "product_id": "dhclient-12:4.1.1-12.P1.el6_0.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhclient@4.1.1-12.P1.el6_0.4?arch=i686\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686", "product": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686", "product_id": "dhcp-12:4.1.1-12.P1.el6_0.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@4.1.1-12.P1.el6_0.4?arch=i686\u0026epoch=12" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "product": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "product_id": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@4.1.1-12.P1.el6_0.4?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "product": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "product_id": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@4.1.1-12.P1.el6_0.4?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "product": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "product_id": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhclient@4.1.1-12.P1.el6_0.4?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "product": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "product_id": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@4.1.1-12.P1.el6_0.4?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "libdhcp4client-12:3.0.5-23.el5_6.4.x86_64", "product": { "name": "libdhcp4client-12:3.0.5-23.el5_6.4.x86_64", "product_id": "libdhcp4client-12:3.0.5-23.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libdhcp4client@3.0.5-23.el5_6.4?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhclient-12:3.0.5-23.el5_6.4.x86_64", "product": { "name": "dhclient-12:3.0.5-23.el5_6.4.x86_64", "product_id": "dhclient-12:3.0.5-23.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhclient@3.0.5-23.el5_6.4?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-12:3.0.5-23.el5_6.4.x86_64", "product": { "name": "dhcp-12:3.0.5-23.el5_6.4.x86_64", "product_id": "dhcp-12:3.0.5-23.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@3.0.5-23.el5_6.4?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64", "product": { "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64", "product_id": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libdhcp4client-devel@3.0.5-23.el5_6.4?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64", "product": { "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64", "product_id": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.5-23.el5_6.4?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-devel-12:3.0.5-23.el5_6.4.x86_64", "product": { "name": "dhcp-devel-12:3.0.5-23.el5_6.4.x86_64", "product_id": "dhcp-devel-12:3.0.5-23.el5_6.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@3.0.5-23.el5_6.4?arch=x86_64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhclient-7:3.0.1-67.el4.x86_64", "product": { "name": "dhclient-7:3.0.1-67.el4.x86_64", "product_id": "dhclient-7:3.0.1-67.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhclient@3.0.1-67.el4?arch=x86_64\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-devel-7:3.0.1-67.el4.x86_64", "product": { "name": "dhcp-devel-7:3.0.1-67.el4.x86_64", "product_id": "dhcp-devel-7:3.0.1-67.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@3.0.1-67.el4?arch=x86_64\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "product": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "product_id": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.1-67.el4?arch=x86_64\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-7:3.0.1-67.el4.x86_64", "product": { "name": "dhcp-7:3.0.1-67.el4.x86_64", "product_id": "dhcp-7:3.0.1-67.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@3.0.1-67.el4?arch=x86_64\u0026epoch=7" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "product": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "product_id": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@4.1.1-12.P1.el6_0.4?arch=ppc64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "product": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "product_id": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@4.1.1-12.P1.el6_0.4?arch=ppc64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "product": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "product_id": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhclient@4.1.1-12.P1.el6_0.4?arch=ppc64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "product": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "product_id": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@4.1.1-12.P1.el6_0.4?arch=ppc64\u0026epoch=12" } } }, { "category": "product_version", "name": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc64", "product": { "name": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc64", "product_id": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libdhcp4client@3.0.5-23.el5_6.4?arch=ppc64\u0026epoch=12" } } }, { "category": "product_version", "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64", "product": { "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64", "product_id": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libdhcp4client-devel@3.0.5-23.el5_6.4?arch=ppc64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64", "product": { "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64", "product_id": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.5-23.el5_6.4?arch=ppc64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc64", "product": { "name": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc64", "product_id": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@3.0.5-23.el5_6.4?arch=ppc64\u0026epoch=12" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "product": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "product_id": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@4.1.1-12.P1.el6_0.4?arch=ppc\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "product": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "product_id": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@4.1.1-12.P1.el6_0.4?arch=ppc\u0026epoch=12" } } }, { "category": "product_version", "name": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc", "product": { "name": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc", "product_id": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libdhcp4client@3.0.5-23.el5_6.4?arch=ppc\u0026epoch=12" } } }, { "category": "product_version", "name": "dhclient-12:3.0.5-23.el5_6.4.ppc", "product": { "name": "dhclient-12:3.0.5-23.el5_6.4.ppc", "product_id": "dhclient-12:3.0.5-23.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhclient@3.0.5-23.el5_6.4?arch=ppc\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-12:3.0.5-23.el5_6.4.ppc", "product": { "name": "dhcp-12:3.0.5-23.el5_6.4.ppc", "product_id": "dhcp-12:3.0.5-23.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@3.0.5-23.el5_6.4?arch=ppc\u0026epoch=12" } } }, { "category": "product_version", "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc", "product": { "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc", "product_id": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libdhcp4client-devel@3.0.5-23.el5_6.4?arch=ppc\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc", "product": { "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc", "product_id": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.5-23.el5_6.4?arch=ppc\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc", "product": { "name": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc", "product_id": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@3.0.5-23.el5_6.4?arch=ppc\u0026epoch=12" } } }, { "category": "product_version", "name": "dhclient-7:3.0.1-67.el4.ppc", "product": { "name": "dhclient-7:3.0.1-67.el4.ppc", "product_id": "dhclient-7:3.0.1-67.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhclient@3.0.1-67.el4?arch=ppc\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-devel-7:3.0.1-67.el4.ppc", "product": { "name": "dhcp-devel-7:3.0.1-67.el4.ppc", "product_id": "dhcp-devel-7:3.0.1-67.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@3.0.1-67.el4?arch=ppc\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-debuginfo-7:3.0.1-67.el4.ppc", "product": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.ppc", "product_id": "dhcp-debuginfo-7:3.0.1-67.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.1-67.el4?arch=ppc\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-7:3.0.1-67.el4.ppc", "product": { "name": "dhcp-7:3.0.1-67.el4.ppc", "product_id": "dhcp-7:3.0.1-67.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@3.0.1-67.el4?arch=ppc\u0026epoch=7" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "product": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "product_id": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@4.1.1-12.P1.el6_0.4?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "product": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "product_id": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@4.1.1-12.P1.el6_0.4?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "product": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "product_id": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhclient@4.1.1-12.P1.el6_0.4?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "product": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "product_id": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@4.1.1-12.P1.el6_0.4?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "libdhcp4client-12:3.0.5-23.el5_6.4.s390x", "product": { "name": "libdhcp4client-12:3.0.5-23.el5_6.4.s390x", "product_id": "libdhcp4client-12:3.0.5-23.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libdhcp4client@3.0.5-23.el5_6.4?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhclient-12:3.0.5-23.el5_6.4.s390x", "product": { "name": "dhclient-12:3.0.5-23.el5_6.4.s390x", "product_id": "dhclient-12:3.0.5-23.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhclient@3.0.5-23.el5_6.4?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-12:3.0.5-23.el5_6.4.s390x", "product": { "name": "dhcp-12:3.0.5-23.el5_6.4.s390x", "product_id": "dhcp-12:3.0.5-23.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@3.0.5-23.el5_6.4?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x", "product": { "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x", "product_id": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libdhcp4client-devel@3.0.5-23.el5_6.4?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x", "product": { "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x", "product_id": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.5-23.el5_6.4?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-devel-12:3.0.5-23.el5_6.4.s390x", "product": { "name": "dhcp-devel-12:3.0.5-23.el5_6.4.s390x", "product_id": "dhcp-devel-12:3.0.5-23.el5_6.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@3.0.5-23.el5_6.4?arch=s390x\u0026epoch=12" } } }, { "category": "product_version", "name": "dhclient-7:3.0.1-67.el4.s390x", "product": { "name": "dhclient-7:3.0.1-67.el4.s390x", "product_id": "dhclient-7:3.0.1-67.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhclient@3.0.1-67.el4?arch=s390x\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-devel-7:3.0.1-67.el4.s390x", "product": { "name": "dhcp-devel-7:3.0.1-67.el4.s390x", "product_id": "dhcp-devel-7:3.0.1-67.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@3.0.1-67.el4?arch=s390x\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-debuginfo-7:3.0.1-67.el4.s390x", "product": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.s390x", "product_id": "dhcp-debuginfo-7:3.0.1-67.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.1-67.el4?arch=s390x\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-7:3.0.1-67.el4.s390x", "product": { "name": "dhcp-7:3.0.1-67.el4.s390x", "product_id": "dhcp-7:3.0.1-67.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@3.0.1-67.el4?arch=s390x\u0026epoch=7" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "product": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "product_id": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@4.1.1-12.P1.el6_0.4?arch=s390\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "product": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "product_id": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@4.1.1-12.P1.el6_0.4?arch=s390\u0026epoch=12" } } }, { "category": "product_version", "name": "libdhcp4client-12:3.0.5-23.el5_6.4.s390", "product": { "name": "libdhcp4client-12:3.0.5-23.el5_6.4.s390", "product_id": "libdhcp4client-12:3.0.5-23.el5_6.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libdhcp4client@3.0.5-23.el5_6.4?arch=s390\u0026epoch=12" } } }, { "category": "product_version", "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390", "product": { "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390", "product_id": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libdhcp4client-devel@3.0.5-23.el5_6.4?arch=s390\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390", "product": { "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390", "product_id": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.5-23.el5_6.4?arch=s390\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-devel-12:3.0.5-23.el5_6.4.s390", "product": { "name": "dhcp-devel-12:3.0.5-23.el5_6.4.s390", "product_id": "dhcp-devel-12:3.0.5-23.el5_6.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@3.0.5-23.el5_6.4?arch=s390\u0026epoch=12" } } }, { "category": "product_version", "name": "dhclient-7:3.0.1-67.el4.s390", "product": { "name": "dhclient-7:3.0.1-67.el4.s390", "product_id": "dhclient-7:3.0.1-67.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhclient@3.0.1-67.el4?arch=s390\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-devel-7:3.0.1-67.el4.s390", "product": { "name": "dhcp-devel-7:3.0.1-67.el4.s390", "product_id": "dhcp-devel-7:3.0.1-67.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@3.0.1-67.el4?arch=s390\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-debuginfo-7:3.0.1-67.el4.s390", "product": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.s390", "product_id": "dhcp-debuginfo-7:3.0.1-67.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.1-67.el4?arch=s390\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-7:3.0.1-67.el4.s390", "product": { "name": "dhcp-7:3.0.1-67.el4.s390", "product_id": "dhcp-7:3.0.1-67.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@3.0.1-67.el4?arch=s390\u0026epoch=7" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "dhcp-12:4.1.1-12.P1.el6_0.4.src", "product": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.src", "product_id": "dhcp-12:4.1.1-12.P1.el6_0.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@4.1.1-12.P1.el6_0.4?arch=src\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-12:3.0.5-23.el5_6.4.src", "product": { "name": "dhcp-12:3.0.5-23.el5_6.4.src", "product_id": "dhcp-12:3.0.5-23.el5_6.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@3.0.5-23.el5_6.4?arch=src\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-7:3.0.1-67.el4.src", "product": { "name": "dhcp-7:3.0.1-67.el4.src", "product_id": "dhcp-7:3.0.1-67.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@3.0.1-67.el4?arch=src\u0026epoch=7" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libdhcp4client-12:3.0.5-23.el5_6.4.ia64", "product": { "name": "libdhcp4client-12:3.0.5-23.el5_6.4.ia64", "product_id": "libdhcp4client-12:3.0.5-23.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libdhcp4client@3.0.5-23.el5_6.4?arch=ia64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhclient-12:3.0.5-23.el5_6.4.ia64", "product": { "name": "dhclient-12:3.0.5-23.el5_6.4.ia64", "product_id": "dhclient-12:3.0.5-23.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhclient@3.0.5-23.el5_6.4?arch=ia64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-12:3.0.5-23.el5_6.4.ia64", "product": { "name": "dhcp-12:3.0.5-23.el5_6.4.ia64", "product_id": "dhcp-12:3.0.5-23.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@3.0.5-23.el5_6.4?arch=ia64\u0026epoch=12" } } }, { "category": "product_version", "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64", "product": { "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64", "product_id": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libdhcp4client-devel@3.0.5-23.el5_6.4?arch=ia64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64", "product": { "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64", "product_id": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.5-23.el5_6.4?arch=ia64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-devel-12:3.0.5-23.el5_6.4.ia64", "product": { "name": "dhcp-devel-12:3.0.5-23.el5_6.4.ia64", "product_id": "dhcp-devel-12:3.0.5-23.el5_6.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@3.0.5-23.el5_6.4?arch=ia64\u0026epoch=12" } } }, { "category": "product_version", "name": "dhclient-7:3.0.1-67.el4.ia64", "product": { "name": "dhclient-7:3.0.1-67.el4.ia64", "product_id": "dhclient-7:3.0.1-67.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhclient@3.0.1-67.el4?arch=ia64\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-devel-7:3.0.1-67.el4.ia64", "product": { "name": "dhcp-devel-7:3.0.1-67.el4.ia64", "product_id": "dhcp-devel-7:3.0.1-67.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@3.0.1-67.el4?arch=ia64\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-debuginfo-7:3.0.1-67.el4.ia64", "product": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.ia64", "product_id": "dhcp-debuginfo-7:3.0.1-67.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.1-67.el4?arch=ia64\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-7:3.0.1-67.el4.ia64", "product": { "name": "dhcp-7:3.0.1-67.el4.ia64", "product_id": "dhcp-7:3.0.1-67.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@3.0.1-67.el4?arch=ia64\u0026epoch=7" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libdhcp4client-12:3.0.5-23.el5_6.4.i386", "product": { "name": "libdhcp4client-12:3.0.5-23.el5_6.4.i386", "product_id": "libdhcp4client-12:3.0.5-23.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libdhcp4client@3.0.5-23.el5_6.4?arch=i386\u0026epoch=12" } } }, { "category": "product_version", "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386", "product": { "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386", "product_id": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libdhcp4client-devel@3.0.5-23.el5_6.4?arch=i386\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386", "product": { "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386", "product_id": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.5-23.el5_6.4?arch=i386\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-devel-12:3.0.5-23.el5_6.4.i386", "product": { "name": "dhcp-devel-12:3.0.5-23.el5_6.4.i386", "product_id": "dhcp-devel-12:3.0.5-23.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@3.0.5-23.el5_6.4?arch=i386\u0026epoch=12" } } }, { "category": "product_version", "name": "dhclient-12:3.0.5-23.el5_6.4.i386", "product": { "name": "dhclient-12:3.0.5-23.el5_6.4.i386", "product_id": "dhclient-12:3.0.5-23.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhclient@3.0.5-23.el5_6.4?arch=i386\u0026epoch=12" } } }, { "category": "product_version", "name": "dhcp-12:3.0.5-23.el5_6.4.i386", "product": { "name": "dhcp-12:3.0.5-23.el5_6.4.i386", "product_id": "dhcp-12:3.0.5-23.el5_6.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@3.0.5-23.el5_6.4?arch=i386\u0026epoch=12" } } }, { "category": "product_version", "name": "dhclient-7:3.0.1-67.el4.i386", "product": { "name": "dhclient-7:3.0.1-67.el4.i386", "product_id": "dhclient-7:3.0.1-67.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhclient@3.0.1-67.el4?arch=i386\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-devel-7:3.0.1-67.el4.i386", "product": { "name": "dhcp-devel-7:3.0.1-67.el4.i386", "product_id": "dhcp-devel-7:3.0.1-67.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-devel@3.0.1-67.el4?arch=i386\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-debuginfo-7:3.0.1-67.el4.i386", "product": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.i386", "product_id": "dhcp-debuginfo-7:3.0.1-67.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp-debuginfo@3.0.1-67.el4?arch=i386\u0026epoch=7" } } }, { "category": "product_version", "name": "dhcp-7:3.0.1-67.el4.i386", "product": { "name": "dhcp-7:3.0.1-67.el4.i386", "product_id": "dhcp-7:3.0.1-67.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/dhcp@3.0.1-67.el4?arch=i386\u0026epoch=7" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhclient-7:3.0.1-67.el4.i386" }, "product_reference": "dhclient-7:3.0.1-67.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhclient-7:3.0.1-67.el4.ia64" }, "product_reference": "dhclient-7:3.0.1-67.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhclient-7:3.0.1-67.el4.ppc" }, "product_reference": "dhclient-7:3.0.1-67.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhclient-7:3.0.1-67.el4.s390" }, "product_reference": "dhclient-7:3.0.1-67.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhclient-7:3.0.1-67.el4.s390x" }, "product_reference": "dhclient-7:3.0.1-67.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhclient-7:3.0.1-67.el4.x86_64" }, "product_reference": "dhclient-7:3.0.1-67.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-7:3.0.1-67.el4.i386" }, "product_reference": "dhcp-7:3.0.1-67.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-7:3.0.1-67.el4.ia64" }, "product_reference": "dhcp-7:3.0.1-67.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-7:3.0.1-67.el4.ppc" }, "product_reference": "dhcp-7:3.0.1-67.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-7:3.0.1-67.el4.s390" }, "product_reference": "dhcp-7:3.0.1-67.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-7:3.0.1-67.el4.s390x" }, "product_reference": "dhcp-7:3.0.1-67.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-7:3.0.1-67.el4.src" }, "product_reference": "dhcp-7:3.0.1-67.el4.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-7:3.0.1-67.el4.x86_64" }, "product_reference": "dhcp-7:3.0.1-67.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-debuginfo-7:3.0.1-67.el4.i386" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-debuginfo-7:3.0.1-67.el4.ia64" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-debuginfo-7:3.0.1-67.el4.ppc" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-debuginfo-7:3.0.1-67.el4.s390" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-debuginfo-7:3.0.1-67.el4.s390x" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-debuginfo-7:3.0.1-67.el4.x86_64" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-devel-7:3.0.1-67.el4.i386" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-devel-7:3.0.1-67.el4.ia64" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-devel-7:3.0.1-67.el4.ppc" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-devel-7:3.0.1-67.el4.s390" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-devel-7:3.0.1-67.el4.s390x" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:dhcp-devel-7:3.0.1-67.el4.x86_64" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhclient-7:3.0.1-67.el4.i386" }, "product_reference": "dhclient-7:3.0.1-67.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhclient-7:3.0.1-67.el4.ia64" }, "product_reference": "dhclient-7:3.0.1-67.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhclient-7:3.0.1-67.el4.ppc" }, "product_reference": "dhclient-7:3.0.1-67.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhclient-7:3.0.1-67.el4.s390" }, "product_reference": "dhclient-7:3.0.1-67.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhclient-7:3.0.1-67.el4.s390x" }, "product_reference": "dhclient-7:3.0.1-67.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhclient-7:3.0.1-67.el4.x86_64" }, "product_reference": "dhclient-7:3.0.1-67.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-7:3.0.1-67.el4.i386" }, "product_reference": "dhcp-7:3.0.1-67.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-7:3.0.1-67.el4.ia64" }, "product_reference": "dhcp-7:3.0.1-67.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-7:3.0.1-67.el4.ppc" }, "product_reference": "dhcp-7:3.0.1-67.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-7:3.0.1-67.el4.s390" }, "product_reference": "dhcp-7:3.0.1-67.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-7:3.0.1-67.el4.s390x" }, "product_reference": "dhcp-7:3.0.1-67.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-7:3.0.1-67.el4.src" }, "product_reference": "dhcp-7:3.0.1-67.el4.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-7:3.0.1-67.el4.x86_64" }, "product_reference": "dhcp-7:3.0.1-67.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.i386" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.ia64" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.ppc" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.s390" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.s390x" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.x86_64" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-devel-7:3.0.1-67.el4.i386" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-devel-7:3.0.1-67.el4.ia64" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-devel-7:3.0.1-67.el4.ppc" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-devel-7:3.0.1-67.el4.s390" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-devel-7:3.0.1-67.el4.s390x" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:dhcp-devel-7:3.0.1-67.el4.x86_64" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhclient-7:3.0.1-67.el4.i386" }, "product_reference": "dhclient-7:3.0.1-67.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhclient-7:3.0.1-67.el4.ia64" }, "product_reference": "dhclient-7:3.0.1-67.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhclient-7:3.0.1-67.el4.ppc" }, "product_reference": "dhclient-7:3.0.1-67.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhclient-7:3.0.1-67.el4.s390" }, "product_reference": "dhclient-7:3.0.1-67.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhclient-7:3.0.1-67.el4.s390x" }, "product_reference": "dhclient-7:3.0.1-67.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhclient-7:3.0.1-67.el4.x86_64" }, "product_reference": "dhclient-7:3.0.1-67.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-7:3.0.1-67.el4.i386" }, "product_reference": "dhcp-7:3.0.1-67.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-7:3.0.1-67.el4.ia64" }, "product_reference": "dhcp-7:3.0.1-67.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-7:3.0.1-67.el4.ppc" }, "product_reference": "dhcp-7:3.0.1-67.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-7:3.0.1-67.el4.s390" }, "product_reference": "dhcp-7:3.0.1-67.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-7:3.0.1-67.el4.s390x" }, "product_reference": "dhcp-7:3.0.1-67.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-7:3.0.1-67.el4.src" }, "product_reference": "dhcp-7:3.0.1-67.el4.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-7:3.0.1-67.el4.x86_64" }, "product_reference": "dhcp-7:3.0.1-67.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-debuginfo-7:3.0.1-67.el4.i386" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-debuginfo-7:3.0.1-67.el4.ia64" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-debuginfo-7:3.0.1-67.el4.ppc" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-debuginfo-7:3.0.1-67.el4.s390" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-debuginfo-7:3.0.1-67.el4.s390x" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-debuginfo-7:3.0.1-67.el4.x86_64" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-devel-7:3.0.1-67.el4.i386" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-devel-7:3.0.1-67.el4.ia64" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-devel-7:3.0.1-67.el4.ppc" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-devel-7:3.0.1-67.el4.s390" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-devel-7:3.0.1-67.el4.s390x" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:dhcp-devel-7:3.0.1-67.el4.x86_64" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhclient-7:3.0.1-67.el4.i386" }, "product_reference": "dhclient-7:3.0.1-67.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhclient-7:3.0.1-67.el4.ia64" }, "product_reference": "dhclient-7:3.0.1-67.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhclient-7:3.0.1-67.el4.ppc" }, "product_reference": "dhclient-7:3.0.1-67.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhclient-7:3.0.1-67.el4.s390" }, "product_reference": "dhclient-7:3.0.1-67.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhclient-7:3.0.1-67.el4.s390x" }, "product_reference": "dhclient-7:3.0.1-67.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhclient-7:3.0.1-67.el4.x86_64" }, "product_reference": "dhclient-7:3.0.1-67.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-7:3.0.1-67.el4.i386" }, "product_reference": "dhcp-7:3.0.1-67.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-7:3.0.1-67.el4.ia64" }, "product_reference": "dhcp-7:3.0.1-67.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-7:3.0.1-67.el4.ppc" }, "product_reference": "dhcp-7:3.0.1-67.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-7:3.0.1-67.el4.s390" }, "product_reference": "dhcp-7:3.0.1-67.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-7:3.0.1-67.el4.s390x" }, "product_reference": "dhcp-7:3.0.1-67.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-7:3.0.1-67.el4.src" }, "product_reference": "dhcp-7:3.0.1-67.el4.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-7:3.0.1-67.el4.x86_64" }, "product_reference": "dhcp-7:3.0.1-67.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-debuginfo-7:3.0.1-67.el4.i386" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-debuginfo-7:3.0.1-67.el4.ia64" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-debuginfo-7:3.0.1-67.el4.ppc" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-debuginfo-7:3.0.1-67.el4.s390" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-debuginfo-7:3.0.1-67.el4.s390x" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-debuginfo-7:3.0.1-67.el4.x86_64" }, "product_reference": "dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-devel-7:3.0.1-67.el4.i386" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-devel-7:3.0.1-67.el4.ia64" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-devel-7:3.0.1-67.el4.ppc" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-devel-7:3.0.1-67.el4.s390" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-devel-7:3.0.1-67.el4.s390x" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-7:3.0.1-67.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:dhcp-devel-7:3.0.1-67.el4.x86_64" }, "product_reference": "dhcp-devel-7:3.0.1-67.el4.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:3.0.5-23.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.i386" }, "product_reference": "dhclient-12:3.0.5-23.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:3.0.5-23.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.ia64" }, "product_reference": "dhclient-12:3.0.5-23.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:3.0.5-23.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.ppc" }, "product_reference": "dhclient-12:3.0.5-23.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:3.0.5-23.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.s390x" }, "product_reference": "dhclient-12:3.0.5-23.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:3.0.5-23.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.x86_64" }, "product_reference": "dhclient-12:3.0.5-23.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:3.0.5-23.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.i386" }, "product_reference": "dhcp-12:3.0.5-23.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:3.0.5-23.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.ia64" }, "product_reference": "dhcp-12:3.0.5-23.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:3.0.5-23.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.ppc" }, "product_reference": "dhcp-12:3.0.5-23.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:3.0.5-23.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.s390x" }, "product_reference": "dhcp-12:3.0.5-23.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:3.0.5-23.el5_6.4.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.src" }, "product_reference": "dhcp-12:3.0.5-23.el5_6.4.src", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:3.0.5-23.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.x86_64" }, "product_reference": "dhcp-12:3.0.5-23.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386" }, "product_reference": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64" }, "product_reference": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc" }, "product_reference": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64" }, "product_reference": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390" }, "product_reference": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x" }, "product_reference": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64" }, "product_reference": "dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:3.0.5-23.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.i386" }, "product_reference": "dhcp-devel-12:3.0.5-23.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:3.0.5-23.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ia64" }, "product_reference": "dhcp-devel-12:3.0.5-23.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ppc" }, "product_reference": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ppc64" }, "product_reference": "dhcp-devel-12:3.0.5-23.el5_6.4.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:3.0.5-23.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.s390" }, "product_reference": "dhcp-devel-12:3.0.5-23.el5_6.4.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:3.0.5-23.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.s390x" }, "product_reference": "dhcp-devel-12:3.0.5-23.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:3.0.5-23.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.x86_64" }, "product_reference": "dhcp-devel-12:3.0.5-23.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libdhcp4client-12:3.0.5-23.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.i386" }, "product_reference": "libdhcp4client-12:3.0.5-23.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libdhcp4client-12:3.0.5-23.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ia64" }, "product_reference": "libdhcp4client-12:3.0.5-23.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ppc" }, "product_reference": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ppc64" }, "product_reference": "libdhcp4client-12:3.0.5-23.el5_6.4.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libdhcp4client-12:3.0.5-23.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.s390" }, "product_reference": "libdhcp4client-12:3.0.5-23.el5_6.4.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libdhcp4client-12:3.0.5-23.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.s390x" }, "product_reference": "libdhcp4client-12:3.0.5-23.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libdhcp4client-12:3.0.5-23.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.x86_64" }, "product_reference": "libdhcp4client-12:3.0.5-23.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386" }, "product_reference": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64" }, "product_reference": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc" }, "product_reference": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64" }, "product_reference": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390" }, "product_reference": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x" }, "product_reference": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64" }, "product_reference": "libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.src" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.src" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.src", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.src" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.src", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.src" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64" }, "product_reference": "dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Sebastian Krahmer" ], "organization": "SuSE Security Team" } ], "cve": "CVE-2011-0997", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "discovery_date": "2011-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "689832" } ], "notes": [ { "category": "description", "text": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.", "title": "Vulnerability description" }, { "category": "summary", "text": "dhclient: insufficient sanitization of certain DHCP response values", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:dhclient-7:3.0.1-67.el4.i386", "4AS:dhclient-7:3.0.1-67.el4.ia64", "4AS:dhclient-7:3.0.1-67.el4.ppc", "4AS:dhclient-7:3.0.1-67.el4.s390", "4AS:dhclient-7:3.0.1-67.el4.s390x", "4AS:dhclient-7:3.0.1-67.el4.x86_64", "4AS:dhcp-7:3.0.1-67.el4.i386", "4AS:dhcp-7:3.0.1-67.el4.ia64", "4AS:dhcp-7:3.0.1-67.el4.ppc", "4AS:dhcp-7:3.0.1-67.el4.s390", "4AS:dhcp-7:3.0.1-67.el4.s390x", "4AS:dhcp-7:3.0.1-67.el4.src", "4AS:dhcp-7:3.0.1-67.el4.x86_64", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.i386", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.ia64", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.ppc", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.s390", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.s390x", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "4AS:dhcp-devel-7:3.0.1-67.el4.i386", "4AS:dhcp-devel-7:3.0.1-67.el4.ia64", "4AS:dhcp-devel-7:3.0.1-67.el4.ppc", "4AS:dhcp-devel-7:3.0.1-67.el4.s390", "4AS:dhcp-devel-7:3.0.1-67.el4.s390x", "4AS:dhcp-devel-7:3.0.1-67.el4.x86_64", "4Desktop:dhclient-7:3.0.1-67.el4.i386", "4Desktop:dhclient-7:3.0.1-67.el4.ia64", "4Desktop:dhclient-7:3.0.1-67.el4.ppc", "4Desktop:dhclient-7:3.0.1-67.el4.s390", "4Desktop:dhclient-7:3.0.1-67.el4.s390x", "4Desktop:dhclient-7:3.0.1-67.el4.x86_64", "4Desktop:dhcp-7:3.0.1-67.el4.i386", "4Desktop:dhcp-7:3.0.1-67.el4.ia64", "4Desktop:dhcp-7:3.0.1-67.el4.ppc", "4Desktop:dhcp-7:3.0.1-67.el4.s390", "4Desktop:dhcp-7:3.0.1-67.el4.s390x", "4Desktop:dhcp-7:3.0.1-67.el4.src", "4Desktop:dhcp-7:3.0.1-67.el4.x86_64", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.i386", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.ia64", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.ppc", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.s390", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.s390x", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "4Desktop:dhcp-devel-7:3.0.1-67.el4.i386", "4Desktop:dhcp-devel-7:3.0.1-67.el4.ia64", "4Desktop:dhcp-devel-7:3.0.1-67.el4.ppc", "4Desktop:dhcp-devel-7:3.0.1-67.el4.s390", "4Desktop:dhcp-devel-7:3.0.1-67.el4.s390x", "4Desktop:dhcp-devel-7:3.0.1-67.el4.x86_64", "4ES:dhclient-7:3.0.1-67.el4.i386", "4ES:dhclient-7:3.0.1-67.el4.ia64", "4ES:dhclient-7:3.0.1-67.el4.ppc", "4ES:dhclient-7:3.0.1-67.el4.s390", "4ES:dhclient-7:3.0.1-67.el4.s390x", "4ES:dhclient-7:3.0.1-67.el4.x86_64", "4ES:dhcp-7:3.0.1-67.el4.i386", "4ES:dhcp-7:3.0.1-67.el4.ia64", "4ES:dhcp-7:3.0.1-67.el4.ppc", "4ES:dhcp-7:3.0.1-67.el4.s390", "4ES:dhcp-7:3.0.1-67.el4.s390x", "4ES:dhcp-7:3.0.1-67.el4.src", "4ES:dhcp-7:3.0.1-67.el4.x86_64", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.i386", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.ia64", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.ppc", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.s390", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.s390x", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "4ES:dhcp-devel-7:3.0.1-67.el4.i386", "4ES:dhcp-devel-7:3.0.1-67.el4.ia64", "4ES:dhcp-devel-7:3.0.1-67.el4.ppc", "4ES:dhcp-devel-7:3.0.1-67.el4.s390", "4ES:dhcp-devel-7:3.0.1-67.el4.s390x", "4ES:dhcp-devel-7:3.0.1-67.el4.x86_64", "4WS:dhclient-7:3.0.1-67.el4.i386", "4WS:dhclient-7:3.0.1-67.el4.ia64", "4WS:dhclient-7:3.0.1-67.el4.ppc", "4WS:dhclient-7:3.0.1-67.el4.s390", "4WS:dhclient-7:3.0.1-67.el4.s390x", "4WS:dhclient-7:3.0.1-67.el4.x86_64", "4WS:dhcp-7:3.0.1-67.el4.i386", "4WS:dhcp-7:3.0.1-67.el4.ia64", "4WS:dhcp-7:3.0.1-67.el4.ppc", "4WS:dhcp-7:3.0.1-67.el4.s390", "4WS:dhcp-7:3.0.1-67.el4.s390x", "4WS:dhcp-7:3.0.1-67.el4.src", "4WS:dhcp-7:3.0.1-67.el4.x86_64", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.i386", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.ia64", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.ppc", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.s390", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.s390x", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "4WS:dhcp-devel-7:3.0.1-67.el4.i386", "4WS:dhcp-devel-7:3.0.1-67.el4.ia64", "4WS:dhcp-devel-7:3.0.1-67.el4.ppc", "4WS:dhcp-devel-7:3.0.1-67.el4.s390", "4WS:dhcp-devel-7:3.0.1-67.el4.s390x", "4WS:dhcp-devel-7:3.0.1-67.el4.x86_64", "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.x86_64", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.src", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.x86_64", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ppc64", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.s390", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.x86_64", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ppc64", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.s390", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.x86_64", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64", "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0997" }, { "category": "external", "summary": "RHBZ#689832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0997", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0997" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0997", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0997" } ], "release_date": "2011-04-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-04-08T14:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS:dhclient-7:3.0.1-67.el4.i386", "4AS:dhclient-7:3.0.1-67.el4.ia64", "4AS:dhclient-7:3.0.1-67.el4.ppc", "4AS:dhclient-7:3.0.1-67.el4.s390", "4AS:dhclient-7:3.0.1-67.el4.s390x", "4AS:dhclient-7:3.0.1-67.el4.x86_64", "4AS:dhcp-7:3.0.1-67.el4.i386", "4AS:dhcp-7:3.0.1-67.el4.ia64", "4AS:dhcp-7:3.0.1-67.el4.ppc", "4AS:dhcp-7:3.0.1-67.el4.s390", "4AS:dhcp-7:3.0.1-67.el4.s390x", "4AS:dhcp-7:3.0.1-67.el4.src", "4AS:dhcp-7:3.0.1-67.el4.x86_64", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.i386", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.ia64", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.ppc", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.s390", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.s390x", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "4AS:dhcp-devel-7:3.0.1-67.el4.i386", "4AS:dhcp-devel-7:3.0.1-67.el4.ia64", "4AS:dhcp-devel-7:3.0.1-67.el4.ppc", "4AS:dhcp-devel-7:3.0.1-67.el4.s390", "4AS:dhcp-devel-7:3.0.1-67.el4.s390x", "4AS:dhcp-devel-7:3.0.1-67.el4.x86_64", "4Desktop:dhclient-7:3.0.1-67.el4.i386", "4Desktop:dhclient-7:3.0.1-67.el4.ia64", "4Desktop:dhclient-7:3.0.1-67.el4.ppc", "4Desktop:dhclient-7:3.0.1-67.el4.s390", "4Desktop:dhclient-7:3.0.1-67.el4.s390x", "4Desktop:dhclient-7:3.0.1-67.el4.x86_64", "4Desktop:dhcp-7:3.0.1-67.el4.i386", "4Desktop:dhcp-7:3.0.1-67.el4.ia64", "4Desktop:dhcp-7:3.0.1-67.el4.ppc", "4Desktop:dhcp-7:3.0.1-67.el4.s390", "4Desktop:dhcp-7:3.0.1-67.el4.s390x", "4Desktop:dhcp-7:3.0.1-67.el4.src", "4Desktop:dhcp-7:3.0.1-67.el4.x86_64", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.i386", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.ia64", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.ppc", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.s390", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.s390x", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "4Desktop:dhcp-devel-7:3.0.1-67.el4.i386", "4Desktop:dhcp-devel-7:3.0.1-67.el4.ia64", "4Desktop:dhcp-devel-7:3.0.1-67.el4.ppc", "4Desktop:dhcp-devel-7:3.0.1-67.el4.s390", "4Desktop:dhcp-devel-7:3.0.1-67.el4.s390x", "4Desktop:dhcp-devel-7:3.0.1-67.el4.x86_64", "4ES:dhclient-7:3.0.1-67.el4.i386", "4ES:dhclient-7:3.0.1-67.el4.ia64", "4ES:dhclient-7:3.0.1-67.el4.ppc", "4ES:dhclient-7:3.0.1-67.el4.s390", "4ES:dhclient-7:3.0.1-67.el4.s390x", "4ES:dhclient-7:3.0.1-67.el4.x86_64", "4ES:dhcp-7:3.0.1-67.el4.i386", "4ES:dhcp-7:3.0.1-67.el4.ia64", "4ES:dhcp-7:3.0.1-67.el4.ppc", "4ES:dhcp-7:3.0.1-67.el4.s390", "4ES:dhcp-7:3.0.1-67.el4.s390x", "4ES:dhcp-7:3.0.1-67.el4.src", "4ES:dhcp-7:3.0.1-67.el4.x86_64", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.i386", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.ia64", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.ppc", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.s390", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.s390x", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "4ES:dhcp-devel-7:3.0.1-67.el4.i386", "4ES:dhcp-devel-7:3.0.1-67.el4.ia64", "4ES:dhcp-devel-7:3.0.1-67.el4.ppc", "4ES:dhcp-devel-7:3.0.1-67.el4.s390", "4ES:dhcp-devel-7:3.0.1-67.el4.s390x", "4ES:dhcp-devel-7:3.0.1-67.el4.x86_64", "4WS:dhclient-7:3.0.1-67.el4.i386", "4WS:dhclient-7:3.0.1-67.el4.ia64", "4WS:dhclient-7:3.0.1-67.el4.ppc", "4WS:dhclient-7:3.0.1-67.el4.s390", "4WS:dhclient-7:3.0.1-67.el4.s390x", "4WS:dhclient-7:3.0.1-67.el4.x86_64", "4WS:dhcp-7:3.0.1-67.el4.i386", "4WS:dhcp-7:3.0.1-67.el4.ia64", "4WS:dhcp-7:3.0.1-67.el4.ppc", "4WS:dhcp-7:3.0.1-67.el4.s390", "4WS:dhcp-7:3.0.1-67.el4.s390x", "4WS:dhcp-7:3.0.1-67.el4.src", "4WS:dhcp-7:3.0.1-67.el4.x86_64", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.i386", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.ia64", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.ppc", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.s390", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.s390x", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "4WS:dhcp-devel-7:3.0.1-67.el4.i386", "4WS:dhcp-devel-7:3.0.1-67.el4.ia64", "4WS:dhcp-devel-7:3.0.1-67.el4.ppc", "4WS:dhcp-devel-7:3.0.1-67.el4.s390", "4WS:dhcp-devel-7:3.0.1-67.el4.s390x", "4WS:dhcp-devel-7:3.0.1-67.el4.x86_64", "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.x86_64", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.src", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.x86_64", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ppc64", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.s390", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.x86_64", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ppc64", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.s390", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.x86_64", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64", "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0428" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "4AS:dhclient-7:3.0.1-67.el4.i386", "4AS:dhclient-7:3.0.1-67.el4.ia64", "4AS:dhclient-7:3.0.1-67.el4.ppc", "4AS:dhclient-7:3.0.1-67.el4.s390", "4AS:dhclient-7:3.0.1-67.el4.s390x", "4AS:dhclient-7:3.0.1-67.el4.x86_64", "4AS:dhcp-7:3.0.1-67.el4.i386", "4AS:dhcp-7:3.0.1-67.el4.ia64", "4AS:dhcp-7:3.0.1-67.el4.ppc", "4AS:dhcp-7:3.0.1-67.el4.s390", "4AS:dhcp-7:3.0.1-67.el4.s390x", "4AS:dhcp-7:3.0.1-67.el4.src", "4AS:dhcp-7:3.0.1-67.el4.x86_64", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.i386", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.ia64", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.ppc", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.s390", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.s390x", "4AS:dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "4AS:dhcp-devel-7:3.0.1-67.el4.i386", "4AS:dhcp-devel-7:3.0.1-67.el4.ia64", "4AS:dhcp-devel-7:3.0.1-67.el4.ppc", "4AS:dhcp-devel-7:3.0.1-67.el4.s390", "4AS:dhcp-devel-7:3.0.1-67.el4.s390x", "4AS:dhcp-devel-7:3.0.1-67.el4.x86_64", "4Desktop:dhclient-7:3.0.1-67.el4.i386", "4Desktop:dhclient-7:3.0.1-67.el4.ia64", "4Desktop:dhclient-7:3.0.1-67.el4.ppc", "4Desktop:dhclient-7:3.0.1-67.el4.s390", "4Desktop:dhclient-7:3.0.1-67.el4.s390x", "4Desktop:dhclient-7:3.0.1-67.el4.x86_64", "4Desktop:dhcp-7:3.0.1-67.el4.i386", "4Desktop:dhcp-7:3.0.1-67.el4.ia64", "4Desktop:dhcp-7:3.0.1-67.el4.ppc", "4Desktop:dhcp-7:3.0.1-67.el4.s390", "4Desktop:dhcp-7:3.0.1-67.el4.s390x", "4Desktop:dhcp-7:3.0.1-67.el4.src", "4Desktop:dhcp-7:3.0.1-67.el4.x86_64", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.i386", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.ia64", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.ppc", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.s390", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.s390x", "4Desktop:dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "4Desktop:dhcp-devel-7:3.0.1-67.el4.i386", "4Desktop:dhcp-devel-7:3.0.1-67.el4.ia64", "4Desktop:dhcp-devel-7:3.0.1-67.el4.ppc", "4Desktop:dhcp-devel-7:3.0.1-67.el4.s390", "4Desktop:dhcp-devel-7:3.0.1-67.el4.s390x", "4Desktop:dhcp-devel-7:3.0.1-67.el4.x86_64", "4ES:dhclient-7:3.0.1-67.el4.i386", "4ES:dhclient-7:3.0.1-67.el4.ia64", "4ES:dhclient-7:3.0.1-67.el4.ppc", "4ES:dhclient-7:3.0.1-67.el4.s390", "4ES:dhclient-7:3.0.1-67.el4.s390x", "4ES:dhclient-7:3.0.1-67.el4.x86_64", "4ES:dhcp-7:3.0.1-67.el4.i386", "4ES:dhcp-7:3.0.1-67.el4.ia64", "4ES:dhcp-7:3.0.1-67.el4.ppc", "4ES:dhcp-7:3.0.1-67.el4.s390", "4ES:dhcp-7:3.0.1-67.el4.s390x", "4ES:dhcp-7:3.0.1-67.el4.src", "4ES:dhcp-7:3.0.1-67.el4.x86_64", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.i386", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.ia64", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.ppc", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.s390", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.s390x", "4ES:dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "4ES:dhcp-devel-7:3.0.1-67.el4.i386", "4ES:dhcp-devel-7:3.0.1-67.el4.ia64", "4ES:dhcp-devel-7:3.0.1-67.el4.ppc", "4ES:dhcp-devel-7:3.0.1-67.el4.s390", "4ES:dhcp-devel-7:3.0.1-67.el4.s390x", "4ES:dhcp-devel-7:3.0.1-67.el4.x86_64", "4WS:dhclient-7:3.0.1-67.el4.i386", "4WS:dhclient-7:3.0.1-67.el4.ia64", "4WS:dhclient-7:3.0.1-67.el4.ppc", "4WS:dhclient-7:3.0.1-67.el4.s390", "4WS:dhclient-7:3.0.1-67.el4.s390x", "4WS:dhclient-7:3.0.1-67.el4.x86_64", "4WS:dhcp-7:3.0.1-67.el4.i386", "4WS:dhcp-7:3.0.1-67.el4.ia64", "4WS:dhcp-7:3.0.1-67.el4.ppc", "4WS:dhcp-7:3.0.1-67.el4.s390", "4WS:dhcp-7:3.0.1-67.el4.s390x", "4WS:dhcp-7:3.0.1-67.el4.src", "4WS:dhcp-7:3.0.1-67.el4.x86_64", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.i386", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.ia64", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.ppc", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.s390", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.s390x", "4WS:dhcp-debuginfo-7:3.0.1-67.el4.x86_64", "4WS:dhcp-devel-7:3.0.1-67.el4.i386", "4WS:dhcp-devel-7:3.0.1-67.el4.ia64", "4WS:dhcp-devel-7:3.0.1-67.el4.ppc", "4WS:dhcp-devel-7:3.0.1-67.el4.s390", "4WS:dhcp-devel-7:3.0.1-67.el4.s390x", "4WS:dhcp-devel-7:3.0.1-67.el4.x86_64", "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:dhclient-12:3.0.5-23.el5_6.4.x86_64", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.src", "5Server-5.6.Z:dhcp-12:3.0.5-23.el5_6.4.x86_64", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.ppc64", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:dhcp-debuginfo-12:3.0.5-23.el5_6.4.x86_64", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.ppc64", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.s390", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:dhcp-devel-12:3.0.5-23.el5_6.4.x86_64", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.ppc64", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.s390", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:libdhcp4client-12:3.0.5-23.el5_6.4.x86_64", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.i386", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ia64", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.ppc64", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.s390x", "5Server-5.6.Z:libdhcp4client-devel-12:3.0.5-23.el5_6.4.x86_64", "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Client-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Client-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Client-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Client-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Client:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Client:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Client:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Client:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6ComputeNode-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6ComputeNode:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6ComputeNode:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Server-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Server-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Server-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Server-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Server:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Server:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Server:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Server:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation-optional:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Workstation-optional:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation-optional:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation-optional:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation:dhclient-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.src", "6Workstation:dhcp-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation:dhcp-debuginfo-12:4.1.1-12.P1.el6_0.4.x86_64", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.i686", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.ppc64", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.s390x", "6Workstation:dhcp-devel-12:4.1.1-12.P1.el6_0.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "dhclient: insufficient sanitization of certain DHCP response values" } ] }
ghsa-hhcj-97jg-v79c
Vulnerability from github
dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.
{ "affected": [], "aliases": [ "CVE-2011-0997" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-04-08T15:17:00Z", "severity": "HIGH" }, "details": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.", "id": "GHSA-hhcj-97jg-v79c", "modified": "2022-05-13T01:27:29Z", "published": "2022-05-13T01:27:29Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0997" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66580" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/37623" }, { "type": "WEB", "url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/44037" }, { "type": "WEB", "url": "http://secunia.com/advisories/44048" }, { "type": "WEB", "url": "http://secunia.com/advisories/44089" }, { "type": "WEB", "url": "http://secunia.com/advisories/44090" }, { "type": "WEB", "url": "http://secunia.com/advisories/44103" }, { "type": "WEB", "url": "http://secunia.com/advisories/44127" }, { "type": "WEB", "url": "http://secunia.com/advisories/44180" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201301-06.xml" }, { "type": "WEB", "url": "http://securitytracker.com/id?1025300" }, { "type": "WEB", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345" }, { "type": "WEB", "url": "http://www.debian.org/security/2011/dsa-2216" }, { "type": "WEB", "url": "http://www.debian.org/security/2011/dsa-2217" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/107886" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:073" }, { "type": "WEB", "url": "http://www.osvdb.org/71493" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0428.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0840.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/47176" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1108-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0879" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0886" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0909" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0915" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0926" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0965" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/1000" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2011-0997
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2011-0997", "description": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.", "id": "GSD-2011-0997", "references": [ "https://www.suse.com/security/cve/CVE-2011-0997.html", "https://www.debian.org/security/2011/dsa-2217", "https://www.debian.org/security/2011/dsa-2216", "https://access.redhat.com/errata/RHSA-2011:0840", "https://access.redhat.com/errata/RHSA-2011:0428", "https://linux.oracle.com/cve/CVE-2011-0997.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-0997" ], "details": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.", "id": "GSD-2011-0997", "modified": "2023-12-13T01:19:04.556751Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "47176", "refsource": "BID", "url": "http://www.securityfocus.com/bid/47176" }, { "name": "ADV-2011-0886", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0886" }, { "name": "44103", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44103" }, { "name": "RHSA-2011:0840", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0840.html" }, { "name": "44037", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44037" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=689832", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832" }, { "name": "ADV-2011-0926", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0926" }, { "name": "HPSBMU02752", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2" }, { "name": "44127", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44127" }, { "name": "MDVSA-2011:073", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:073" }, { "name": "SSRT100802", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2" }, { "name": "ADV-2011-0909", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0909" }, { "name": "oval:org.mitre.oval:def:12812", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812" }, { "name": "71493", "refsource": "OSVDB", "url": "http://www.osvdb.org/71493" }, { "name": "44090", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44090" }, { "name": "44048", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44048" }, { "name": "FEDORA-2011-4934", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html" }, { "name": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997", "refsource": "CONFIRM", "url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997" }, { "name": "iscdhcp-dhclient-command-execution(66580)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66580" }, { "name": "ADV-2011-0879", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0879" }, { "name": "VU#107886", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/107886" }, { "name": "1025300", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1025300" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761" }, { "name": "SSA:2011-097-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345" }, { "name": "ADV-2011-1000", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/1000" }, { "name": "ADV-2011-0915", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0915" }, { "name": "ADV-2011-0965", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0965" }, { "name": "37623", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/37623/" }, { "name": "GLSA-201301-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201301-06.xml" }, { "name": "44180", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44180" }, { "name": "DSA-2217", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2217" }, { "name": "USN-1108-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1108-1" }, { "name": "DSA-2216", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2216" }, { "name": "FEDORA-2011-4897", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html" }, { "name": "RHSA-2011:0428", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0428.html" }, { "name": "44089", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44089" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.1:rc9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.2:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.2:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.2:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.2:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.2:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.3:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.3:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.3:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.3:b3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.4:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.4:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.4:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.4:b3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.4:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.5:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.5:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.0.6:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1-esv:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:a1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:a2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:a3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.2:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.2:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.2:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.3:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.3:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:3.1.3:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.1-esv:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:a1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:a2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.1:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.1:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:dhcp:4.2.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0997" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "44037", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44037" }, { "name": "71493", "refsource": "OSVDB", "tags": [ "Broken Link" ], "url": "http://www.osvdb.org/71493" }, { "name": "ADV-2011-0879", "refsource": "VUPEN", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2011/0879" }, { "name": "1025300", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1025300" }, { "name": "47176", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/47176" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=689832", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=689832" }, { "name": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.isc.org/software/dhcp/advisories/cve-2011-0997" }, { "name": "VU#107886", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/107886" }, { "name": "44048", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44048" }, { "name": "44127", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44127" }, { "name": "FEDORA-2011-4897", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057888.html" }, { "name": "44089", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44089" }, { "name": "RHSA-2011:0428", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0428.html" }, { "name": "ADV-2011-0915", "refsource": "VUPEN", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2011/0915" }, { "name": "44103", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44103" }, { "name": "DSA-2217", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2011/dsa-2217" }, { "name": "MDVSA-2011:073", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:073" }, { "name": "ADV-2011-0965", "refsource": "VUPEN", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2011/0965" }, { "name": "44090", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44090" }, { "name": "FEDORA-2011-4934", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058279.html" }, { "name": "44180", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/44180" }, { "name": "ADV-2011-0926", "refsource": "VUPEN", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2011/0926" }, { "name": "SSA:2011-097-01", "refsource": "SLACKWARE", "tags": [ "Third Party Advisory" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.593345" }, { "name": "DSA-2216", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2011/dsa-2216" }, { "name": "ADV-2011-0886", "refsource": "VUPEN", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2011/0886" }, { "name": "ADV-2011-0909", "refsource": "VUPEN", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2011/0909" }, { "name": "USN-1108-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1108-1" }, { "name": "ADV-2011-1000", "refsource": "VUPEN", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2011/1000" }, { "name": "RHSA-2011:0840", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0840.html" }, { "name": "HPSBMU02752", "refsource": "HP", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=133226187115472\u0026w=2" }, { "name": "GLSA-201301-06", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-201301-06.xml" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10761" }, { "name": "iscdhcp-dhclient-command-execution(66580)", "refsource": "XF", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66580" }, { "name": "37623", "refsource": "EXPLOIT-DB", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/37623/" }, { "name": "oval:org.mitre.oval:def:12812", "refsource": "OVAL", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12812" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2020-04-01T13:07Z", "publishedDate": "2011-04-08T15:17Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.