Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-2693 (GCVE-0-2012-2693)
Vulnerability from cvelistv5 – Published: 2012-06-17 01:00 – Updated: 2024-08-06 19:42- n/a
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T19:42:31.709Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20120611 Re: CVE request -- libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2012/06/11/3"
},
{
"name": "RHSA-2013:0127",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0127.html"
},
{
"name": "[libvirt] 20120428 [PATCH 0/3] usb devices with same vendor, productID hotplug support",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://www.redhat.com/archives/libvir-list/2012-April/msg01494.html"
},
{
"name": "RHSA-2012:0748",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0748.html"
},
{
"name": "[oss-security] 20120611 CVE request -- libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2012/06/11/2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-04-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "libvirt, possibly before 0.9.12, does not properly assign USB devices to virtual machines when multiple devices have the same vendor and product ID, which might cause the wrong device to be associated with a guest and might allow local users to access unintended USB devices."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-07-23T09:00:00",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[oss-security] 20120611 Re: CVE request -- libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2012/06/11/3"
},
{
"name": "RHSA-2013:0127",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0127.html"
},
{
"name": "[libvirt] 20120428 [PATCH 0/3] usb devices with same vendor, productID hotplug support",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://www.redhat.com/archives/libvir-list/2012-April/msg01494.html"
},
{
"name": "RHSA-2012:0748",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0748.html"
},
{
"name": "[oss-security] 20120611 CVE request -- libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2012/06/11/2"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2012-2693",
"datePublished": "2012-06-17T01:00:00",
"dateReserved": "2012-05-14T00:00:00",
"dateUpdated": "2024-08-06T19:42:31.709Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"0.9.11\", \"matchCriteriaId\": \"01916DA0-D0B0-4355-B72D-76B2E9B05988\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AFF5EF5-280A-499B-BD63-361EDC49A923\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2A0DD5B-AFDD-4DA4-B19C-2CA73FA9B477\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE616C79-74E0-4876-83D7-BE04CB954F92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87FF4782-A017-4D6F-9588-BE0AD4AA04E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B7FDA56-4C79-4D79-9EDA-8A936C7D8DE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF62226E-E4FE-4AF5-86A2-344148158A22\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C540F8A3-E12A-403B-81D2-CDB28DE03E47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0900588-EBF9-4459-B1D7-588B72E40689\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE650A9D-D12D-43C5-B276-B3116CF096F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"359F1970-822B-4430-86EB-15091B2B4338\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D08DB661-40DF-4234-9F6B-2EE0746FAC8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E86D1293-6881-4F9D-B245-E16040921DF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C49F1101-0845-478F-BEA1-67185A763D37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F1FDF3E-87F8-4CBF-99F8-DBB03C7D2318\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA319732-E860-459E-9C20-ED31D90510DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06B16020-5330-4F99-8DD3-8B4037E22CFB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BCA6D83-281F-4B28-9CB2-253614017B5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEBBD0C7-F9D3-48D4-8D76-1FAFFB049300\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C97CB42C-C89F-4BE6-80AC-A020EBF369FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCC2F2D6-90E3-4306-A29A-0A507BDF889C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB533B81-AFF3-442E-A499-555F2181F64D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53AD34A3-9097-4375-BB30-CAED13987396\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80E37E3B-18A8-4D34-9400-2C18D0DBAAAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36EAE07C-284D-4BEB-ABDF-28C157B3B90B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E28C5275-39D4-4C7C-A064-70161FE35802\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"643D7C4C-6BD9-49CE-A7FD-819300CA955C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77476F3F-A914-4EC6-9488-189BD9E1AE6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B22C7B3D-169D-45CC-B1C1-9864991B3E05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D6D1F10-2908-42E0-8D8F-1FBBC804505D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC9ABBF2-B1AD-446A-A3D2-E103D1B411A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"450BD95B-5CE1-49E7-B6DB-6C14D9115CC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"508578FC-BDC7-4B44-9F98-BD6CD657F57B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD25F37B-C666-4EDB-AD77-CCE04A800348\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8903EA9-D354-4C9E-B308-653689534AFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F811BE37-6F53-4663-819F-E954787C345B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2886A659-24BD-483B-8FCD-5BC21573EE42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65FD148D-0088-47D5-AAC1-E0E990F9D170\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84613074-CFA0-4C0B-B896-0751F652EA71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BCCF73F-8542-4955-ACD6-44F199D49CB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05C7EF0F-C069-424A-9B3F-D07C72450ADA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F25DF6A-34D5-4D5B-AFAF-7A21202460EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B67C29ED-2975-47F0-AE75-875A380ECC56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC90B806-1FB3-434E-A664-2842AD3BA9CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DCDC5B5-1DD4-4FF4-8AB4-D38F5418B873\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0054B43A-F844-47C8-B03A-01696117B7E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5C78A50-0F41-405C-9ABA-EE088D0ABE60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8322F4E2-0AD0-497B-871E-233C0E0F1490\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E41CEF32-4998-41D5-B971-12E7F4E39FB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E43FD74C-5986-4E9E-9C4F-9891133084A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D504B27-7BD0-4CB1-B8CA-76B7C537A4C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBFD9B43-52BA-4FF9-84A1-369B1A96A166\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10EE76EF-44D3-4645-B1E7-5BCFB4CB4204\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"934215BC-33D1-453F-B49B-23B52E580214\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F274792B-F190-4A23-A551-6B07EA4028B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9D67FBC-4009-4FC1-B0CF-AA3C1505C2F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2059834-5A26-4DB9-B400-DBBE15690AAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2F6277D-6732-44BA-91B4-D57877E011BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2553A171-A830-4540-8CC6-51275F72AAEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61C2C484-7AAB-475C-A44E-6D9DCF597DD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04A75CCF-28E1-44CC-962C-C56A4F64B370\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0E8A1AF-740A-454C-8019-B52654589603\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F040825C-C457-40A1-A04C-F362289E13F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3327FB7D-92DB-479F-BF1C-2565C8F1B25C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48F55C0A-3E6E-4E24-81D7-F023728E486A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACB7C00E-DF4E-40AF-A503-202A2FE03D5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AB4E8A8-2B6C-4287-937B-C67A97EAB67A\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"libvirt, possibly before 0.9.12, does not properly assign USB devices to virtual machines when multiple devices have the same vendor and product ID, which might cause the wrong device to be associated with a guest and might allow local users to access unintended USB devices.\"}, {\"lang\": \"es\", \"value\": \"libvirt, posiblemente anterior a v0.9.12, no se asignan adecuadamente los dispositivos USB a las m\\u00e1quinas virtuales cuando varios dispositivos tienen el mismo proveedor y la misma identificaci\\u00f3n de producto, lo que podr\\u00eda provocar que el dispositivo equivocado sea asociado con un invitado lo que podr\\u00eda podr\\u00eda permitir a usuarios locales acceder a los dispositivos USB no deseados.\"}]",
"id": "CVE-2012-2693",
"lastModified": "2024-11-21T01:39:27.597",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:H/Au:N/C:P/I:P/A:P\", \"baseScore\": 3.7, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"HIGH\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 1.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2012-06-17T03:41:42.203",
"references": "[{\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-0748.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0127.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/06/11/2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/06/11/3\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://www.redhat.com/archives/libvir-list/2012-April/msg01494.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-0748.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0127.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/06/11/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2012/06/11/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/libvir-list/2012-April/msg01494.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2012-2693\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-06-17T03:41:42.203\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"libvirt, possibly before 0.9.12, does not properly assign USB devices to virtual machines when multiple devices have the same vendor and product ID, which might cause the wrong device to be associated with a guest and might allow local users to access unintended USB devices.\"},{\"lang\":\"es\",\"value\":\"libvirt, posiblemente anterior a v0.9.12, no se asignan adecuadamente los dispositivos USB a las m\u00e1quinas virtuales cuando varios dispositivos tienen el mismo proveedor y la misma identificaci\u00f3n de producto, lo que podr\u00eda provocar que el dispositivo equivocado sea asociado con un invitado lo que podr\u00eda podr\u00eda permitir a usuarios locales acceder a los dispositivos USB no deseados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":3.7,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":1.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.9.11\",\"matchCriteriaId\":\"01916DA0-D0B0-4355-B72D-76B2E9B05988\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AFF5EF5-280A-499B-BD63-361EDC49A923\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2A0DD5B-AFDD-4DA4-B19C-2CA73FA9B477\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE616C79-74E0-4876-83D7-BE04CB954F92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87FF4782-A017-4D6F-9588-BE0AD4AA04E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B7FDA56-4C79-4D79-9EDA-8A936C7D8DE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF62226E-E4FE-4AF5-86A2-344148158A22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C540F8A3-E12A-403B-81D2-CDB28DE03E47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0900588-EBF9-4459-B1D7-588B72E40689\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE650A9D-D12D-43C5-B276-B3116CF096F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"359F1970-822B-4430-86EB-15091B2B4338\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08DB661-40DF-4234-9F6B-2EE0746FAC8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E86D1293-6881-4F9D-B245-E16040921DF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C49F1101-0845-478F-BEA1-67185A763D37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F1FDF3E-87F8-4CBF-99F8-DBB03C7D2318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA319732-E860-459E-9C20-ED31D90510DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06B16020-5330-4F99-8DD3-8B4037E22CFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BCA6D83-281F-4B28-9CB2-253614017B5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEBBD0C7-F9D3-48D4-8D76-1FAFFB049300\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C97CB42C-C89F-4BE6-80AC-A020EBF369FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCC2F2D6-90E3-4306-A29A-0A507BDF889C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB533B81-AFF3-442E-A499-555F2181F64D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53AD34A3-9097-4375-BB30-CAED13987396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E37E3B-18A8-4D34-9400-2C18D0DBAAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36EAE07C-284D-4BEB-ABDF-28C157B3B90B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28C5275-39D4-4C7C-A064-70161FE35802\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"643D7C4C-6BD9-49CE-A7FD-819300CA955C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77476F3F-A914-4EC6-9488-189BD9E1AE6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B22C7B3D-169D-45CC-B1C1-9864991B3E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D6D1F10-2908-42E0-8D8F-1FBBC804505D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC9ABBF2-B1AD-446A-A3D2-E103D1B411A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"450BD95B-5CE1-49E7-B6DB-6C14D9115CC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"508578FC-BDC7-4B44-9F98-BD6CD657F57B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD25F37B-C666-4EDB-AD77-CCE04A800348\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8903EA9-D354-4C9E-B308-653689534AFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F811BE37-6F53-4663-819F-E954787C345B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2886A659-24BD-483B-8FCD-5BC21573EE42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65FD148D-0088-47D5-AAC1-E0E990F9D170\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84613074-CFA0-4C0B-B896-0751F652EA71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BCCF73F-8542-4955-ACD6-44F199D49CB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05C7EF0F-C069-424A-9B3F-D07C72450ADA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F25DF6A-34D5-4D5B-AFAF-7A21202460EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B67C29ED-2975-47F0-AE75-875A380ECC56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC90B806-1FB3-434E-A664-2842AD3BA9CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DCDC5B5-1DD4-4FF4-8AB4-D38F5418B873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0054B43A-F844-47C8-B03A-01696117B7E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5C78A50-0F41-405C-9ABA-EE088D0ABE60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8322F4E2-0AD0-497B-871E-233C0E0F1490\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E41CEF32-4998-41D5-B971-12E7F4E39FB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E43FD74C-5986-4E9E-9C4F-9891133084A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D504B27-7BD0-4CB1-B8CA-76B7C537A4C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBFD9B43-52BA-4FF9-84A1-369B1A96A166\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10EE76EF-44D3-4645-B1E7-5BCFB4CB4204\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"934215BC-33D1-453F-B49B-23B52E580214\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F274792B-F190-4A23-A551-6B07EA4028B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9D67FBC-4009-4FC1-B0CF-AA3C1505C2F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2059834-5A26-4DB9-B400-DBBE15690AAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2F6277D-6732-44BA-91B4-D57877E011BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2553A171-A830-4540-8CC6-51275F72AAEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61C2C484-7AAB-475C-A44E-6D9DCF597DD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04A75CCF-28E1-44CC-962C-C56A4F64B370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0E8A1AF-740A-454C-8019-B52654589603\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F040825C-C457-40A1-A04C-F362289E13F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3327FB7D-92DB-479F-BF1C-2565C8F1B25C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48F55C0A-3E6E-4E24-81D7-F023728E486A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACB7C00E-DF4E-40AF-A503-202A2FE03D5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AB4E8A8-2B6C-4287-937B-C67A97EAB67A\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0748.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0127.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/06/11/2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/06/11/3\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.redhat.com/archives/libvir-list/2012-April/msg01494.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0748.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0127.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/06/11/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/06/11/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/libvir-list/2012-April/msg01494.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}"
}
}
RHSA-2013_0127
Vulnerability from csaf_redhat - Published: 2013-01-08 04:20 - Updated: 2024-11-22 04:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated libvirt packages that fix one security issue and several bugs are\nnow available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library is a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remote management of virtualized\nsystems.\n\nBus and device IDs were ignored when attempting to attach multiple USB\ndevices with identical vendor or product IDs to a guest. This could result\nin the wrong device being attached to a guest, giving that guest root\naccess to the device. (CVE-2012-2693)\n\nThis update also fixes the following bugs:\n\n* Previously, the libvirtd library failed to set the autostart flags for\nalready defined QEMU domains. This bug has been fixed, and the domains can\nnow be successfully marked as autostarted. (BZ#675319)\n\n* Prior to this update, the virFileAbsPath() function was not taking into\naccount the slash (\"/\") directory separator when allocating memory for\ncombining the cwd() function and a path. This behavior could lead to a\nmemory corruption. With this update, a transformation to the virAsprintff()\nfunction has been introduced into virFileAbsPath(). As a result, the\naforementioned behavior no longer occurs. (BZ#680289)\n\n* With this update, a man page of the virsh user interface has been\nenhanced with information on the \"domxml-from-native\" and\n\"domxml-to-native\" commands. A correct notation of the format argument has\nbeen clarified. As a result, confusion is avoided when setting the format\nargument in the described commands. (BZ#783001)\n\nAll users of libvirt are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After installing\nthe updated packages, libvirtd will be restarted automatically.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:0127",
"url": "https://access.redhat.com/errata/RHSA-2013:0127"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "675319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=675319"
},
{
"category": "external",
"summary": "680289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=680289"
},
{
"category": "external",
"summary": "772821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=772821"
},
{
"category": "external",
"summary": "772848",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=772848"
},
{
"category": "external",
"summary": "783001",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=783001"
},
{
"category": "external",
"summary": "831164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831164"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0127.json"
}
],
"title": "Red Hat Security Advisory: libvirt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T04:53:27+00:00",
"generator": {
"date": "2024-11-22T04:53:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2013:0127",
"initial_release_date": "2013-01-08T04:20:00+00:00",
"revision_history": [
{
"date": "2013-01-08T04:20:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-01-08T04:21:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:53:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_virtualization:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_virtualization:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.8.2-29.el5.i386",
"product": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.i386",
"product_id": "libvirt-debuginfo-0:0.8.2-29.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.2-29.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.8.2-29.el5.i386",
"product": {
"name": "libvirt-devel-0:0.8.2-29.el5.i386",
"product_id": "libvirt-devel-0:0.8.2-29.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.8.2-29.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.8.2-29.el5.i386",
"product": {
"name": "libvirt-0:0.8.2-29.el5.i386",
"product_id": "libvirt-0:0.8.2-29.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.8.2-29.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.8.2-29.el5.i386",
"product": {
"name": "libvirt-python-0:0.8.2-29.el5.i386",
"product_id": "libvirt-python-0:0.8.2-29.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.8.2-29.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"product": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"product_id": "libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.2-29.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.8.2-29.el5.x86_64",
"product": {
"name": "libvirt-devel-0:0.8.2-29.el5.x86_64",
"product_id": "libvirt-devel-0:0.8.2-29.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.8.2-29.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.8.2-29.el5.x86_64",
"product": {
"name": "libvirt-0:0.8.2-29.el5.x86_64",
"product_id": "libvirt-0:0.8.2-29.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.8.2-29.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.8.2-29.el5.x86_64",
"product": {
"name": "libvirt-python-0:0.8.2-29.el5.x86_64",
"product_id": "libvirt-python-0:0.8.2-29.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.8.2-29.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"product": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"product_id": "libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.2-29.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.8.2-29.el5.ia64",
"product": {
"name": "libvirt-devel-0:0.8.2-29.el5.ia64",
"product_id": "libvirt-devel-0:0.8.2-29.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.8.2-29.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.8.2-29.el5.ia64",
"product": {
"name": "libvirt-0:0.8.2-29.el5.ia64",
"product_id": "libvirt-0:0.8.2-29.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.8.2-29.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.8.2-29.el5.ia64",
"product": {
"name": "libvirt-python-0:0.8.2-29.el5.ia64",
"product_id": "libvirt-python-0:0.8.2-29.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.8.2-29.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:0.8.2-29.el5.src",
"product": {
"name": "libvirt-0:0.8.2-29.el5.src",
"product_id": "libvirt-0:0.8.2-29.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.8.2-29.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.8.2-29.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-0:0.8.2-29.el5.i386"
},
"product_reference": "libvirt-0:0.8.2-29.el5.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.8.2-29.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-0:0.8.2-29.el5.ia64"
},
"product_reference": "libvirt-0:0.8.2-29.el5.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.8.2-29.el5.src as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-0:0.8.2-29.el5.src"
},
"product_reference": "libvirt-0:0.8.2-29.el5.src",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.8.2-29.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-0:0.8.2-29.el5.x86_64"
},
"product_reference": "libvirt-0:0.8.2-29.el5.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.i386"
},
"product_reference": "libvirt-debuginfo-0:0.8.2-29.el5.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.ia64"
},
"product_reference": "libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.8.2-29.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-devel-0:0.8.2-29.el5.i386"
},
"product_reference": "libvirt-devel-0:0.8.2-29.el5.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.8.2-29.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-devel-0:0.8.2-29.el5.ia64"
},
"product_reference": "libvirt-devel-0:0.8.2-29.el5.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.8.2-29.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-devel-0:0.8.2-29.el5.x86_64"
},
"product_reference": "libvirt-devel-0:0.8.2-29.el5.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.8.2-29.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-python-0:0.8.2-29.el5.i386"
},
"product_reference": "libvirt-python-0:0.8.2-29.el5.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.8.2-29.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-python-0:0.8.2-29.el5.ia64"
},
"product_reference": "libvirt-python-0:0.8.2-29.el5.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.8.2-29.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-python-0:0.8.2-29.el5.x86_64"
},
"product_reference": "libvirt-python-0:0.8.2-29.el5.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.8.2-29.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-0:0.8.2-29.el5.i386"
},
"product_reference": "libvirt-0:0.8.2-29.el5.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.8.2-29.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-0:0.8.2-29.el5.ia64"
},
"product_reference": "libvirt-0:0.8.2-29.el5.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.8.2-29.el5.src as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-0:0.8.2-29.el5.src"
},
"product_reference": "libvirt-0:0.8.2-29.el5.src",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.8.2-29.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-0:0.8.2-29.el5.x86_64"
},
"product_reference": "libvirt-0:0.8.2-29.el5.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.i386"
},
"product_reference": "libvirt-debuginfo-0:0.8.2-29.el5.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.ia64"
},
"product_reference": "libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.8.2-29.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-devel-0:0.8.2-29.el5.i386"
},
"product_reference": "libvirt-devel-0:0.8.2-29.el5.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.8.2-29.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-devel-0:0.8.2-29.el5.ia64"
},
"product_reference": "libvirt-devel-0:0.8.2-29.el5.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.8.2-29.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-devel-0:0.8.2-29.el5.x86_64"
},
"product_reference": "libvirt-devel-0:0.8.2-29.el5.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.8.2-29.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-python-0:0.8.2-29.el5.i386"
},
"product_reference": "libvirt-python-0:0.8.2-29.el5.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.8.2-29.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-python-0:0.8.2-29.el5.ia64"
},
"product_reference": "libvirt-python-0:0.8.2-29.el5.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.8.2-29.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-python-0:0.8.2-29.el5.x86_64"
},
"product_reference": "libvirt-python-0:0.8.2-29.el5.x86_64",
"relates_to_product_reference": "5Server-VT"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-2693",
"discovery_date": "2012-04-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "831164"
}
],
"notes": [
{
"category": "description",
"text": "libvirt, possibly before 0.9.12, does not properly assign USB devices to virtual machines when multiple devices have the same vendor and product ID, which might cause the wrong device to be associated with a guest and might allow local users to access unintended USB devices.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-VT:libvirt-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-0:0.8.2-29.el5.src",
"5Client-VT:libvirt-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-0:0.8.2-29.el5.src",
"5Server-VT:libvirt-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-2693"
},
{
"category": "external",
"summary": "RHBZ#831164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831164"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2693",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2693"
}
],
"release_date": "2012-04-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-01-08T04:20:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-VT:libvirt-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-0:0.8.2-29.el5.src",
"5Client-VT:libvirt-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-0:0.8.2-29.el5.src",
"5Server-VT:libvirt-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0127"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.7,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-VT:libvirt-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-0:0.8.2-29.el5.src",
"5Client-VT:libvirt-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-0:0.8.2-29.el5.src",
"5Server-VT:libvirt-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored"
}
]
}
RHSA-2012:0748
Vulnerability from csaf_redhat - Published: 2012-06-19 15:21 - Updated: 2025-11-21 17:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated libvirt packages that fix one security issue, multiple bugs, and\nadd various enhancements are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library is a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remote management of virtualized\nsystems.\n\nBus and device IDs were ignored when attempting to attach multiple USB\ndevices with identical vendor or product IDs to a guest. This could result\nin the wrong device being attached to a guest, giving that guest root\naccess to the device. (CVE-2012-2693)\n\nThese updated libvirt packages include numerous bug fixes and enhancements.\nSpace precludes documenting all of these changes in this advisory. Users\nare directed to the Red Hat Enterprise Linux 6.3 Technical Notes for\ninformation on the most significant of these changes.\n\nAll users of libvirt are advised to upgrade to these updated packages,\nwhich fix these issues and add these enhancements. After installing the\nupdated packages, libvirtd must be restarted (\"service libvirtd restart\")\nfor this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0748",
"url": "https://access.redhat.com/errata/RHSA-2012:0748"
},
{
"category": "external",
"summary": "700272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=700272"
},
{
"category": "external",
"summary": "700523",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=700523"
},
{
"category": "external",
"summary": "702260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=702260"
},
{
"category": "external",
"summary": "708735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=708735"
},
{
"category": "external",
"summary": "709265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=709265"
},
{
"category": "external",
"summary": "712266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=712266"
},
{
"category": "external",
"summary": "713932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=713932"
},
{
"category": "external",
"summary": "715019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=715019"
},
{
"category": "external",
"summary": "770971",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770971"
},
{
"category": "external",
"summary": "811227",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=811227"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.3_Technical_Notes/libvirt.html#RHSA-2012-0748",
"url": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.3_Technical_Notes/libvirt.html#RHSA-2012-0748"
},
{
"category": "external",
"summary": "515293",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515293"
},
{
"category": "external",
"summary": "589849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=589849"
},
{
"category": "external",
"summary": "605953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=605953"
},
{
"category": "external",
"summary": "611823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=611823"
},
{
"category": "external",
"summary": "611824",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=611824"
},
{
"category": "external",
"summary": "613537",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613537"
},
{
"category": "external",
"summary": "619846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=619846"
},
{
"category": "external",
"summary": "624447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=624447"
},
{
"category": "external",
"summary": "625115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=625115"
},
{
"category": "external",
"summary": "625362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=625362"
},
{
"category": "external",
"summary": "628823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=628823"
},
{
"category": "external",
"summary": "638633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=638633"
},
{
"category": "external",
"summary": "639599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=639599"
},
{
"category": "external",
"summary": "643373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=643373"
},
{
"category": "external",
"summary": "648594",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=648594"
},
{
"category": "external",
"summary": "673499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=673499"
},
{
"category": "external",
"summary": "673811",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=673811"
},
{
"category": "external",
"summary": "680880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=680880"
},
{
"category": "external",
"summary": "685083",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=685083"
},
{
"category": "external",
"summary": "689768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689768"
},
{
"category": "external",
"summary": "693758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=693758"
},
{
"category": "external",
"summary": "697808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=697808"
},
{
"category": "external",
"summary": "715590",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=715590"
},
{
"category": "external",
"summary": "725269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725269"
},
{
"category": "external",
"summary": "725373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725373"
},
{
"category": "external",
"summary": "726174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=726174"
},
{
"category": "external",
"summary": "726771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=726771"
},
{
"category": "external",
"summary": "729694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=729694"
},
{
"category": "external",
"summary": "731151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=731151"
},
{
"category": "external",
"summary": "731645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=731645"
},
{
"category": "external",
"summary": "731656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=731656"
},
{
"category": "external",
"summary": "733587",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=733587"
},
{
"category": "external",
"summary": "735950",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=735950"
},
{
"category": "external",
"summary": "738933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738933"
},
{
"category": "external",
"summary": "741510",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=741510"
},
{
"category": "external",
"summary": "743671",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=743671"
},
{
"category": "external",
"summary": "744237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=744237"
},
{
"category": "external",
"summary": "746111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=746111"
},
{
"category": "external",
"summary": "747619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747619"
},
{
"category": "external",
"summary": "748248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=748248"
},
{
"category": "external",
"summary": "748354",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=748354"
},
{
"category": "external",
"summary": "748405",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=748405"
},
{
"category": "external",
"summary": "748742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=748742"
},
{
"category": "external",
"summary": "750683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750683"
},
{
"category": "external",
"summary": "751631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751631"
},
{
"category": "external",
"summary": "751725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751725"
},
{
"category": "external",
"summary": "752255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=752255"
},
{
"category": "external",
"summary": "753169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=753169"
},
{
"category": "external",
"summary": "754128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=754128"
},
{
"category": "external",
"summary": "758231",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=758231"
},
{
"category": "external",
"summary": "758590",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=758590"
},
{
"category": "external",
"summary": "760149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=760149"
},
{
"category": "external",
"summary": "760436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=760436"
},
{
"category": "external",
"summary": "760883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=760883"
},
{
"category": "external",
"summary": "761005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761005"
},
{
"category": "external",
"summary": "761344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761344"
},
{
"category": "external",
"summary": "761345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761345"
},
{
"category": "external",
"summary": "761347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761347"
},
{
"category": "external",
"summary": "761402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761402"
},
{
"category": "external",
"summary": "761453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761453"
},
{
"category": "external",
"summary": "765698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=765698"
},
{
"category": "external",
"summary": "766308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=766308"
},
{
"category": "external",
"summary": "766553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=766553"
},
{
"category": "external",
"summary": "767104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767104"
},
{
"category": "external",
"summary": "767333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767333"
},
{
"category": "external",
"summary": "767364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767364"
},
{
"category": "external",
"summary": "767488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767488"
},
{
"category": "external",
"summary": "768268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=768268"
},
{
"category": "external",
"summary": "768450",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=768450"
},
{
"category": "external",
"summary": "768860",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=768860"
},
{
"category": "external",
"summary": "768870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=768870"
},
{
"category": "external",
"summary": "769224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=769224"
},
{
"category": "external",
"summary": "769251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=769251"
},
{
"category": "external",
"summary": "769506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=769506"
},
{
"category": "external",
"summary": "769752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=769752"
},
{
"category": "external",
"summary": "770031",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770031"
},
{
"category": "external",
"summary": "770458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770458"
},
{
"category": "external",
"summary": "770520",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770520"
},
{
"category": "external",
"summary": "770683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770683"
},
{
"category": "external",
"summary": "770919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770919"
},
{
"category": "external",
"summary": "770940",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770940"
},
{
"category": "external",
"summary": "770941",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770941"
},
{
"category": "external",
"summary": "770942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770942"
},
{
"category": "external",
"summary": "770943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770943"
},
{
"category": "external",
"summary": "770944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770944"
},
{
"category": "external",
"summary": "771016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771016"
},
{
"category": "external",
"summary": "771021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771021"
},
{
"category": "external",
"summary": "771562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771562"
},
{
"category": "external",
"summary": "771570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771570"
},
{
"category": "external",
"summary": "771591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771591"
},
{
"category": "external",
"summary": "772697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=772697"
},
{
"category": "external",
"summary": "773208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=773208"
},
{
"category": "external",
"summary": "773667",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=773667"
},
{
"category": "external",
"summary": "781562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=781562"
},
{
"category": "external",
"summary": "781985",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=781985"
},
{
"category": "external",
"summary": "782716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=782716"
},
{
"category": "external",
"summary": "783184",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=783184"
},
{
"category": "external",
"summary": "783921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=783921"
},
{
"category": "external",
"summary": "785164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785164"
},
{
"category": "external",
"summary": "785269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785269"
},
{
"category": "external",
"summary": "786534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=786534"
},
{
"category": "external",
"summary": "786674",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=786674"
},
{
"category": "external",
"summary": "786770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=786770"
},
{
"category": "external",
"summary": "787761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=787761"
},
{
"category": "external",
"summary": "788338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788338"
},
{
"category": "external",
"summary": "789220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789220"
},
{
"category": "external",
"summary": "790436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790436"
},
{
"category": "external",
"summary": "790744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790744"
},
{
"category": "external",
"summary": "790745",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790745"
},
{
"category": "external",
"summary": "790789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790789"
},
{
"category": "external",
"summary": "795093",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=795093"
},
{
"category": "external",
"summary": "795127",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=795127"
},
{
"category": "external",
"summary": "795656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=795656"
},
{
"category": "external",
"summary": "795978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=795978"
},
{
"category": "external",
"summary": "796526",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=796526"
},
{
"category": "external",
"summary": "797066",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=797066"
},
{
"category": "external",
"summary": "798220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=798220"
},
{
"category": "external",
"summary": "798497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=798497"
},
{
"category": "external",
"summary": "798938",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=798938"
},
{
"category": "external",
"summary": "799478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=799478"
},
{
"category": "external",
"summary": "800366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=800366"
},
{
"category": "external",
"summary": "801160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=801160"
},
{
"category": "external",
"summary": "801443",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=801443"
},
{
"category": "external",
"summary": "801970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=801970"
},
{
"category": "external",
"summary": "802644",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=802644"
},
{
"category": "external",
"summary": "802851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=802851"
},
{
"category": "external",
"summary": "802854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=802854"
},
{
"category": "external",
"summary": "802856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=802856"
},
{
"category": "external",
"summary": "803591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=803591"
},
{
"category": "external",
"summary": "804028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=804028"
},
{
"category": "external",
"summary": "806098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=806098"
},
{
"category": "external",
"summary": "807147",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=807147"
},
{
"category": "external",
"summary": "807555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=807555"
},
{
"category": "external",
"summary": "807751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=807751"
},
{
"category": "external",
"summary": "808371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=808371"
},
{
"category": "external",
"summary": "808459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=808459"
},
{
"category": "external",
"summary": "808522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=808522"
},
{
"category": "external",
"summary": "808527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=808527"
},
{
"category": "external",
"summary": "808979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=808979"
},
{
"category": "external",
"summary": "810100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=810100"
},
{
"category": "external",
"summary": "810157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=810157"
},
{
"category": "external",
"summary": "810241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=810241"
},
{
"category": "external",
"summary": "810559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=810559"
},
{
"category": "external",
"summary": "811497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=811497"
},
{
"category": "external",
"summary": "811683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=811683"
},
{
"category": "external",
"summary": "813972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=813972"
},
{
"category": "external",
"summary": "814021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=814021"
},
{
"category": "external",
"summary": "814080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=814080"
},
{
"category": "external",
"summary": "815270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=815270"
},
{
"category": "external",
"summary": "815503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=815503"
},
{
"category": "external",
"summary": "815791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=815791"
},
{
"category": "external",
"summary": "816465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=816465"
},
{
"category": "external",
"summary": "816662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=816662"
},
{
"category": "external",
"summary": "817078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=817078"
},
{
"category": "external",
"summary": "817234",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=817234"
},
{
"category": "external",
"summary": "819014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=819014"
},
{
"category": "external",
"summary": "819498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=819498"
},
{
"category": "external",
"summary": "819499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=819499"
},
{
"category": "external",
"summary": "819636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=819636"
},
{
"category": "external",
"summary": "820461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=820461"
},
{
"category": "external",
"summary": "820869",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=820869"
},
{
"category": "external",
"summary": "698521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=698521"
},
{
"category": "external",
"summary": "831164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831164"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0748.json"
}
],
"title": "Red Hat Security Advisory: libvirt security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T17:40:36+00:00",
"generator": {
"date": "2025-11-21T17:40:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2012:0748",
"initial_release_date": "2012-06-19T15:21:00+00:00",
"revision_history": [
{
"date": "2012-06-19T15:21:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-06-19T15:31:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:40:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Storage Server 3",
"product": {
"name": "Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:storage:3:server:el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:0.9.10-21.el6.src",
"product": {
"name": "libvirt-0:0.9.10-21.el6.src",
"product_id": "libvirt-0:0.9.10-21.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.9.10-21.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"product": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"product_id": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.9.10-21.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"product_id": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@0.9.10-21.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.9.10-21.el6.x86_64",
"product": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64",
"product_id": "libvirt-client-0:0.9.10-21.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.9.10-21.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.9.10-21.el6.x86_64",
"product": {
"name": "libvirt-0:0.9.10-21.el6.x86_64",
"product_id": "libvirt-0:0.9.10-21.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.9.10-21.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.9.10-21.el6.x86_64",
"product": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64",
"product_id": "libvirt-python-0:0.9.10-21.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.9.10-21.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"product": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"product_id": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.9.10-21.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"product": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"product_id": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.9.10-21.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"product": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"product_id": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@0.9.10-21.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.9.10-21.el6.i686",
"product": {
"name": "libvirt-client-0:0.9.10-21.el6.i686",
"product_id": "libvirt-client-0:0.9.10-21.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.9.10-21.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.9.10-21.el6.i686",
"product": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686",
"product_id": "libvirt-devel-0:0.9.10-21.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.9.10-21.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.9.10-21.el6.i686",
"product": {
"name": "libvirt-0:0.9.10-21.el6.i686",
"product_id": "libvirt-0:0.9.10-21.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.9.10-21.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.9.10-21.el6.i686",
"product": {
"name": "libvirt-python-0:0.9.10-21.el6.i686",
"product_id": "libvirt-python-0:0.9.10-21.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.9.10-21.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:0.9.10-21.el6.s390x",
"product": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x",
"product_id": "libvirt-client-0:0.9.10-21.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.9.10-21.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.9.10-21.el6.s390x",
"product": {
"name": "libvirt-0:0.9.10-21.el6.s390x",
"product_id": "libvirt-0:0.9.10-21.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.9.10-21.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.9.10-21.el6.s390x",
"product": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x",
"product_id": "libvirt-devel-0:0.9.10-21.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.9.10-21.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.9.10-21.el6.s390x",
"product": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x",
"product_id": "libvirt-python-0:0.9.10-21.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.9.10-21.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"product": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"product_id": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.9.10-21.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:0.9.10-21.el6.s390",
"product": {
"name": "libvirt-client-0:0.9.10-21.el6.s390",
"product_id": "libvirt-client-0:0.9.10-21.el6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.9.10-21.el6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.9.10-21.el6.s390",
"product": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390",
"product_id": "libvirt-devel-0:0.9.10-21.el6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.9.10-21.el6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"product": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"product_id": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.9.10-21.el6?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:0.9.10-21.el6.ppc",
"product": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc",
"product_id": "libvirt-client-0:0.9.10-21.el6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.9.10-21.el6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.9.10-21.el6.ppc",
"product": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc",
"product_id": "libvirt-devel-0:0.9.10-21.el6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.9.10-21.el6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"product": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"product_id": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.9.10-21.el6?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:0.9.10-21.el6.ppc64",
"product": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64",
"product_id": "libvirt-client-0:0.9.10-21.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.9.10-21.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.9.10-21.el6.ppc64",
"product": {
"name": "libvirt-0:0.9.10-21.el6.ppc64",
"product_id": "libvirt-0:0.9.10-21.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.9.10-21.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"product": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"product_id": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.9.10-21.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.9.10-21.el6.ppc64",
"product": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64",
"product_id": "libvirt-python-0:0.9.10-21.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.9.10-21.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"product": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"product_id": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.9.10-21.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-2693",
"discovery_date": "2012-04-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "831164"
}
],
"notes": [
{
"category": "description",
"text": "libvirt, possibly before 0.9.12, does not properly assign USB devices to virtual machines when multiple devices have the same vendor and product ID, which might cause the wrong device to be associated with a guest and might allow local users to access unintended USB devices.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:libvirt-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-0:0.9.10-21.el6.src",
"6Client-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-0:0.9.10-21.el6.i686",
"6Client:libvirt-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-0:0.9.10-21.el6.s390x",
"6Client:libvirt-0:0.9.10-21.el6.src",
"6Client:libvirt-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-client-0:0.9.10-21.el6.i686",
"6Client:libvirt-client-0:0.9.10-21.el6.ppc",
"6Client:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-client-0:0.9.10-21.el6.s390",
"6Client:libvirt-client-0:0.9.10-21.el6.s390x",
"6Client:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-devel-0:0.9.10-21.el6.i686",
"6Client:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Client:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-devel-0:0.9.10-21.el6.s390",
"6Client:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Client:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Client:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-python-0:0.9.10-21.el6.i686",
"6Client:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-python-0:0.9.10-21.el6.s390x",
"6Client:libvirt-python-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.src",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-0:0.9.10-21.el6.src",
"6ComputeNode:libvirt-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.src",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-0:0.9.10-21.el6.src",
"6Server-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-0:0.9.10-21.el6.i686",
"6Server:libvirt-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-0:0.9.10-21.el6.s390x",
"6Server:libvirt-0:0.9.10-21.el6.src",
"6Server:libvirt-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-client-0:0.9.10-21.el6.i686",
"6Server:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-client-0:0.9.10-21.el6.s390",
"6Server:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-python-0:0.9.10-21.el6.i686",
"6Server:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.src",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-0:0.9.10-21.el6.src",
"6Workstation:libvirt-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-client-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-client-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-client-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-client-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-python-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-python-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-python-0:0.9.10-21.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-2693"
},
{
"category": "external",
"summary": "RHBZ#831164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831164"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2693",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2693"
}
],
"release_date": "2012-04-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-06-19T15:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-optional:libvirt-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-0:0.9.10-21.el6.src",
"6Client-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-0:0.9.10-21.el6.i686",
"6Client:libvirt-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-0:0.9.10-21.el6.s390x",
"6Client:libvirt-0:0.9.10-21.el6.src",
"6Client:libvirt-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-client-0:0.9.10-21.el6.i686",
"6Client:libvirt-client-0:0.9.10-21.el6.ppc",
"6Client:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-client-0:0.9.10-21.el6.s390",
"6Client:libvirt-client-0:0.9.10-21.el6.s390x",
"6Client:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-devel-0:0.9.10-21.el6.i686",
"6Client:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Client:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-devel-0:0.9.10-21.el6.s390",
"6Client:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Client:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Client:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-python-0:0.9.10-21.el6.i686",
"6Client:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-python-0:0.9.10-21.el6.s390x",
"6Client:libvirt-python-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.src",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-0:0.9.10-21.el6.src",
"6ComputeNode:libvirt-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.src",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-0:0.9.10-21.el6.src",
"6Server-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-0:0.9.10-21.el6.i686",
"6Server:libvirt-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-0:0.9.10-21.el6.s390x",
"6Server:libvirt-0:0.9.10-21.el6.src",
"6Server:libvirt-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-client-0:0.9.10-21.el6.i686",
"6Server:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-client-0:0.9.10-21.el6.s390",
"6Server:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-python-0:0.9.10-21.el6.i686",
"6Server:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.src",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-0:0.9.10-21.el6.src",
"6Workstation:libvirt-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-client-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-client-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-client-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-client-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-python-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-python-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-python-0:0.9.10-21.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0748"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.7,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Client-optional:libvirt-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-0:0.9.10-21.el6.src",
"6Client-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-0:0.9.10-21.el6.i686",
"6Client:libvirt-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-0:0.9.10-21.el6.s390x",
"6Client:libvirt-0:0.9.10-21.el6.src",
"6Client:libvirt-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-client-0:0.9.10-21.el6.i686",
"6Client:libvirt-client-0:0.9.10-21.el6.ppc",
"6Client:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-client-0:0.9.10-21.el6.s390",
"6Client:libvirt-client-0:0.9.10-21.el6.s390x",
"6Client:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-devel-0:0.9.10-21.el6.i686",
"6Client:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Client:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-devel-0:0.9.10-21.el6.s390",
"6Client:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Client:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Client:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-python-0:0.9.10-21.el6.i686",
"6Client:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-python-0:0.9.10-21.el6.s390x",
"6Client:libvirt-python-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.src",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-0:0.9.10-21.el6.src",
"6ComputeNode:libvirt-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.src",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-0:0.9.10-21.el6.src",
"6Server-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-0:0.9.10-21.el6.i686",
"6Server:libvirt-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-0:0.9.10-21.el6.s390x",
"6Server:libvirt-0:0.9.10-21.el6.src",
"6Server:libvirt-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-client-0:0.9.10-21.el6.i686",
"6Server:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-client-0:0.9.10-21.el6.s390",
"6Server:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-python-0:0.9.10-21.el6.i686",
"6Server:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.src",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-0:0.9.10-21.el6.src",
"6Workstation:libvirt-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-client-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-client-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-client-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-client-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-python-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-python-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-python-0:0.9.10-21.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored"
}
]
}
RHSA-2013:0127
Vulnerability from csaf_redhat - Published: 2013-01-08 04:20 - Updated: 2025-11-21 17:41Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated libvirt packages that fix one security issue and several bugs are\nnow available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library is a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remote management of virtualized\nsystems.\n\nBus and device IDs were ignored when attempting to attach multiple USB\ndevices with identical vendor or product IDs to a guest. This could result\nin the wrong device being attached to a guest, giving that guest root\naccess to the device. (CVE-2012-2693)\n\nThis update also fixes the following bugs:\n\n* Previously, the libvirtd library failed to set the autostart flags for\nalready defined QEMU domains. This bug has been fixed, and the domains can\nnow be successfully marked as autostarted. (BZ#675319)\n\n* Prior to this update, the virFileAbsPath() function was not taking into\naccount the slash (\"/\") directory separator when allocating memory for\ncombining the cwd() function and a path. This behavior could lead to a\nmemory corruption. With this update, a transformation to the virAsprintff()\nfunction has been introduced into virFileAbsPath(). As a result, the\naforementioned behavior no longer occurs. (BZ#680289)\n\n* With this update, a man page of the virsh user interface has been\nenhanced with information on the \"domxml-from-native\" and\n\"domxml-to-native\" commands. A correct notation of the format argument has\nbeen clarified. As a result, confusion is avoided when setting the format\nargument in the described commands. (BZ#783001)\n\nAll users of libvirt are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After installing\nthe updated packages, libvirtd will be restarted automatically.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:0127",
"url": "https://access.redhat.com/errata/RHSA-2013:0127"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "675319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=675319"
},
{
"category": "external",
"summary": "680289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=680289"
},
{
"category": "external",
"summary": "772821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=772821"
},
{
"category": "external",
"summary": "772848",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=772848"
},
{
"category": "external",
"summary": "783001",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=783001"
},
{
"category": "external",
"summary": "831164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831164"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0127.json"
}
],
"title": "Red Hat Security Advisory: libvirt security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:41:47+00:00",
"generator": {
"date": "2025-11-21T17:41:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2013:0127",
"initial_release_date": "2013-01-08T04:20:00+00:00",
"revision_history": [
{
"date": "2013-01-08T04:20:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-01-08T04:21:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:41:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_virtualization:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_virtualization:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.8.2-29.el5.i386",
"product": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.i386",
"product_id": "libvirt-debuginfo-0:0.8.2-29.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.2-29.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.8.2-29.el5.i386",
"product": {
"name": "libvirt-devel-0:0.8.2-29.el5.i386",
"product_id": "libvirt-devel-0:0.8.2-29.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.8.2-29.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.8.2-29.el5.i386",
"product": {
"name": "libvirt-0:0.8.2-29.el5.i386",
"product_id": "libvirt-0:0.8.2-29.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.8.2-29.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.8.2-29.el5.i386",
"product": {
"name": "libvirt-python-0:0.8.2-29.el5.i386",
"product_id": "libvirt-python-0:0.8.2-29.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.8.2-29.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"product": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"product_id": "libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.2-29.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.8.2-29.el5.x86_64",
"product": {
"name": "libvirt-devel-0:0.8.2-29.el5.x86_64",
"product_id": "libvirt-devel-0:0.8.2-29.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.8.2-29.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.8.2-29.el5.x86_64",
"product": {
"name": "libvirt-0:0.8.2-29.el5.x86_64",
"product_id": "libvirt-0:0.8.2-29.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.8.2-29.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.8.2-29.el5.x86_64",
"product": {
"name": "libvirt-python-0:0.8.2-29.el5.x86_64",
"product_id": "libvirt-python-0:0.8.2-29.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.8.2-29.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"product": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"product_id": "libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.8.2-29.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.8.2-29.el5.ia64",
"product": {
"name": "libvirt-devel-0:0.8.2-29.el5.ia64",
"product_id": "libvirt-devel-0:0.8.2-29.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.8.2-29.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.8.2-29.el5.ia64",
"product": {
"name": "libvirt-0:0.8.2-29.el5.ia64",
"product_id": "libvirt-0:0.8.2-29.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.8.2-29.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.8.2-29.el5.ia64",
"product": {
"name": "libvirt-python-0:0.8.2-29.el5.ia64",
"product_id": "libvirt-python-0:0.8.2-29.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.8.2-29.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:0.8.2-29.el5.src",
"product": {
"name": "libvirt-0:0.8.2-29.el5.src",
"product_id": "libvirt-0:0.8.2-29.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.8.2-29.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.8.2-29.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-0:0.8.2-29.el5.i386"
},
"product_reference": "libvirt-0:0.8.2-29.el5.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.8.2-29.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-0:0.8.2-29.el5.ia64"
},
"product_reference": "libvirt-0:0.8.2-29.el5.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.8.2-29.el5.src as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-0:0.8.2-29.el5.src"
},
"product_reference": "libvirt-0:0.8.2-29.el5.src",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.8.2-29.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-0:0.8.2-29.el5.x86_64"
},
"product_reference": "libvirt-0:0.8.2-29.el5.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.i386"
},
"product_reference": "libvirt-debuginfo-0:0.8.2-29.el5.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.ia64"
},
"product_reference": "libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.8.2-29.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-devel-0:0.8.2-29.el5.i386"
},
"product_reference": "libvirt-devel-0:0.8.2-29.el5.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.8.2-29.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-devel-0:0.8.2-29.el5.ia64"
},
"product_reference": "libvirt-devel-0:0.8.2-29.el5.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.8.2-29.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-devel-0:0.8.2-29.el5.x86_64"
},
"product_reference": "libvirt-devel-0:0.8.2-29.el5.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.8.2-29.el5.i386 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-python-0:0.8.2-29.el5.i386"
},
"product_reference": "libvirt-python-0:0.8.2-29.el5.i386",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.8.2-29.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-python-0:0.8.2-29.el5.ia64"
},
"product_reference": "libvirt-python-0:0.8.2-29.el5.ia64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.8.2-29.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Multi OS (v. 5 client)",
"product_id": "5Client-VT:libvirt-python-0:0.8.2-29.el5.x86_64"
},
"product_reference": "libvirt-python-0:0.8.2-29.el5.x86_64",
"relates_to_product_reference": "5Client-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.8.2-29.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-0:0.8.2-29.el5.i386"
},
"product_reference": "libvirt-0:0.8.2-29.el5.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.8.2-29.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-0:0.8.2-29.el5.ia64"
},
"product_reference": "libvirt-0:0.8.2-29.el5.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.8.2-29.el5.src as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-0:0.8.2-29.el5.src"
},
"product_reference": "libvirt-0:0.8.2-29.el5.src",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.8.2-29.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-0:0.8.2-29.el5.x86_64"
},
"product_reference": "libvirt-0:0.8.2-29.el5.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.i386"
},
"product_reference": "libvirt-debuginfo-0:0.8.2-29.el5.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.ia64"
},
"product_reference": "libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.8.2-29.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.8.2-29.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-devel-0:0.8.2-29.el5.i386"
},
"product_reference": "libvirt-devel-0:0.8.2-29.el5.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.8.2-29.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-devel-0:0.8.2-29.el5.ia64"
},
"product_reference": "libvirt-devel-0:0.8.2-29.el5.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.8.2-29.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-devel-0:0.8.2-29.el5.x86_64"
},
"product_reference": "libvirt-devel-0:0.8.2-29.el5.x86_64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.8.2-29.el5.i386 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-python-0:0.8.2-29.el5.i386"
},
"product_reference": "libvirt-python-0:0.8.2-29.el5.i386",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.8.2-29.el5.ia64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-python-0:0.8.2-29.el5.ia64"
},
"product_reference": "libvirt-python-0:0.8.2-29.el5.ia64",
"relates_to_product_reference": "5Server-VT"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.8.2-29.el5.x86_64 as a component of Red Hat Enterprise Linux Virtualization (v. 5 server)",
"product_id": "5Server-VT:libvirt-python-0:0.8.2-29.el5.x86_64"
},
"product_reference": "libvirt-python-0:0.8.2-29.el5.x86_64",
"relates_to_product_reference": "5Server-VT"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-2693",
"discovery_date": "2012-04-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "831164"
}
],
"notes": [
{
"category": "description",
"text": "libvirt, possibly before 0.9.12, does not properly assign USB devices to virtual machines when multiple devices have the same vendor and product ID, which might cause the wrong device to be associated with a guest and might allow local users to access unintended USB devices.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-VT:libvirt-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-0:0.8.2-29.el5.src",
"5Client-VT:libvirt-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-0:0.8.2-29.el5.src",
"5Server-VT:libvirt-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-2693"
},
{
"category": "external",
"summary": "RHBZ#831164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831164"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2693",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2693"
}
],
"release_date": "2012-04-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-01-08T04:20:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Client-VT:libvirt-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-0:0.8.2-29.el5.src",
"5Client-VT:libvirt-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-0:0.8.2-29.el5.src",
"5Server-VT:libvirt-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0127"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.7,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-VT:libvirt-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-0:0.8.2-29.el5.src",
"5Client-VT:libvirt-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-devel-0:0.8.2-29.el5.x86_64",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.i386",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.ia64",
"5Client-VT:libvirt-python-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-0:0.8.2-29.el5.src",
"5Server-VT:libvirt-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-debuginfo-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-devel-0:0.8.2-29.el5.x86_64",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.i386",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.ia64",
"5Server-VT:libvirt-python-0:0.8.2-29.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored"
}
]
}
RHSA-2012_0748
Vulnerability from csaf_redhat - Published: 2012-06-19 15:21 - Updated: 2024-11-22 04:53Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated libvirt packages that fix one security issue, multiple bugs, and\nadd various enhancements are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libvirt library is a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remote management of virtualized\nsystems.\n\nBus and device IDs were ignored when attempting to attach multiple USB\ndevices with identical vendor or product IDs to a guest. This could result\nin the wrong device being attached to a guest, giving that guest root\naccess to the device. (CVE-2012-2693)\n\nThese updated libvirt packages include numerous bug fixes and enhancements.\nSpace precludes documenting all of these changes in this advisory. Users\nare directed to the Red Hat Enterprise Linux 6.3 Technical Notes for\ninformation on the most significant of these changes.\n\nAll users of libvirt are advised to upgrade to these updated packages,\nwhich fix these issues and add these enhancements. After installing the\nupdated packages, libvirtd must be restarted (\"service libvirtd restart\")\nfor this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2012:0748",
"url": "https://access.redhat.com/errata/RHSA-2012:0748"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#low",
"url": "https://access.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.3_Technical_Notes/libvirt.html#RHSA-2012-0748",
"url": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.3_Technical_Notes/libvirt.html#RHSA-2012-0748"
},
{
"category": "external",
"summary": "515293",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515293"
},
{
"category": "external",
"summary": "589849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=589849"
},
{
"category": "external",
"summary": "605953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=605953"
},
{
"category": "external",
"summary": "611823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=611823"
},
{
"category": "external",
"summary": "611824",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=611824"
},
{
"category": "external",
"summary": "613537",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=613537"
},
{
"category": "external",
"summary": "619846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=619846"
},
{
"category": "external",
"summary": "624447",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=624447"
},
{
"category": "external",
"summary": "625115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=625115"
},
{
"category": "external",
"summary": "625362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=625362"
},
{
"category": "external",
"summary": "628823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=628823"
},
{
"category": "external",
"summary": "638633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=638633"
},
{
"category": "external",
"summary": "639599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=639599"
},
{
"category": "external",
"summary": "643373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=643373"
},
{
"category": "external",
"summary": "648594",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=648594"
},
{
"category": "external",
"summary": "673499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=673499"
},
{
"category": "external",
"summary": "673811",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=673811"
},
{
"category": "external",
"summary": "680880",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=680880"
},
{
"category": "external",
"summary": "685083",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=685083"
},
{
"category": "external",
"summary": "689768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=689768"
},
{
"category": "external",
"summary": "693758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=693758"
},
{
"category": "external",
"summary": "697808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=697808"
},
{
"category": "external",
"summary": "698521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=698521"
},
{
"category": "external",
"summary": "700272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=700272"
},
{
"category": "external",
"summary": "700523",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=700523"
},
{
"category": "external",
"summary": "702260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=702260"
},
{
"category": "external",
"summary": "708735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=708735"
},
{
"category": "external",
"summary": "709265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=709265"
},
{
"category": "external",
"summary": "712266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=712266"
},
{
"category": "external",
"summary": "713932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=713932"
},
{
"category": "external",
"summary": "715019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=715019"
},
{
"category": "external",
"summary": "715590",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=715590"
},
{
"category": "external",
"summary": "725269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725269"
},
{
"category": "external",
"summary": "725373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725373"
},
{
"category": "external",
"summary": "726174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=726174"
},
{
"category": "external",
"summary": "726771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=726771"
},
{
"category": "external",
"summary": "729694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=729694"
},
{
"category": "external",
"summary": "731151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=731151"
},
{
"category": "external",
"summary": "731645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=731645"
},
{
"category": "external",
"summary": "731656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=731656"
},
{
"category": "external",
"summary": "733587",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=733587"
},
{
"category": "external",
"summary": "735950",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=735950"
},
{
"category": "external",
"summary": "738933",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=738933"
},
{
"category": "external",
"summary": "741510",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=741510"
},
{
"category": "external",
"summary": "743671",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=743671"
},
{
"category": "external",
"summary": "744237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=744237"
},
{
"category": "external",
"summary": "746111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=746111"
},
{
"category": "external",
"summary": "747619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=747619"
},
{
"category": "external",
"summary": "748248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=748248"
},
{
"category": "external",
"summary": "748354",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=748354"
},
{
"category": "external",
"summary": "748405",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=748405"
},
{
"category": "external",
"summary": "748742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=748742"
},
{
"category": "external",
"summary": "750683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750683"
},
{
"category": "external",
"summary": "751631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751631"
},
{
"category": "external",
"summary": "751725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=751725"
},
{
"category": "external",
"summary": "752255",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=752255"
},
{
"category": "external",
"summary": "753169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=753169"
},
{
"category": "external",
"summary": "754128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=754128"
},
{
"category": "external",
"summary": "758231",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=758231"
},
{
"category": "external",
"summary": "758590",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=758590"
},
{
"category": "external",
"summary": "760149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=760149"
},
{
"category": "external",
"summary": "760436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=760436"
},
{
"category": "external",
"summary": "760883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=760883"
},
{
"category": "external",
"summary": "761005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761005"
},
{
"category": "external",
"summary": "761344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761344"
},
{
"category": "external",
"summary": "761345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761345"
},
{
"category": "external",
"summary": "761347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761347"
},
{
"category": "external",
"summary": "761402",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761402"
},
{
"category": "external",
"summary": "761453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=761453"
},
{
"category": "external",
"summary": "765698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=765698"
},
{
"category": "external",
"summary": "766308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=766308"
},
{
"category": "external",
"summary": "766553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=766553"
},
{
"category": "external",
"summary": "767104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767104"
},
{
"category": "external",
"summary": "767333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767333"
},
{
"category": "external",
"summary": "767364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767364"
},
{
"category": "external",
"summary": "767488",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=767488"
},
{
"category": "external",
"summary": "768268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=768268"
},
{
"category": "external",
"summary": "768450",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=768450"
},
{
"category": "external",
"summary": "768860",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=768860"
},
{
"category": "external",
"summary": "768870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=768870"
},
{
"category": "external",
"summary": "769224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=769224"
},
{
"category": "external",
"summary": "769251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=769251"
},
{
"category": "external",
"summary": "769506",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=769506"
},
{
"category": "external",
"summary": "769752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=769752"
},
{
"category": "external",
"summary": "770031",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770031"
},
{
"category": "external",
"summary": "770458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770458"
},
{
"category": "external",
"summary": "770520",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770520"
},
{
"category": "external",
"summary": "770683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770683"
},
{
"category": "external",
"summary": "770919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770919"
},
{
"category": "external",
"summary": "770940",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770940"
},
{
"category": "external",
"summary": "770941",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770941"
},
{
"category": "external",
"summary": "770942",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770942"
},
{
"category": "external",
"summary": "770943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770943"
},
{
"category": "external",
"summary": "770944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770944"
},
{
"category": "external",
"summary": "770971",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=770971"
},
{
"category": "external",
"summary": "771016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771016"
},
{
"category": "external",
"summary": "771021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771021"
},
{
"category": "external",
"summary": "771562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771562"
},
{
"category": "external",
"summary": "771570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771570"
},
{
"category": "external",
"summary": "771591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=771591"
},
{
"category": "external",
"summary": "772697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=772697"
},
{
"category": "external",
"summary": "773208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=773208"
},
{
"category": "external",
"summary": "773667",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=773667"
},
{
"category": "external",
"summary": "781562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=781562"
},
{
"category": "external",
"summary": "781985",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=781985"
},
{
"category": "external",
"summary": "782716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=782716"
},
{
"category": "external",
"summary": "783184",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=783184"
},
{
"category": "external",
"summary": "783921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=783921"
},
{
"category": "external",
"summary": "785164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785164"
},
{
"category": "external",
"summary": "785269",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=785269"
},
{
"category": "external",
"summary": "786534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=786534"
},
{
"category": "external",
"summary": "786674",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=786674"
},
{
"category": "external",
"summary": "786770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=786770"
},
{
"category": "external",
"summary": "787761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=787761"
},
{
"category": "external",
"summary": "788338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=788338"
},
{
"category": "external",
"summary": "789220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=789220"
},
{
"category": "external",
"summary": "790436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790436"
},
{
"category": "external",
"summary": "790744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790744"
},
{
"category": "external",
"summary": "790745",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790745"
},
{
"category": "external",
"summary": "790789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=790789"
},
{
"category": "external",
"summary": "795093",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=795093"
},
{
"category": "external",
"summary": "795127",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=795127"
},
{
"category": "external",
"summary": "795656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=795656"
},
{
"category": "external",
"summary": "795978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=795978"
},
{
"category": "external",
"summary": "796526",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=796526"
},
{
"category": "external",
"summary": "797066",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=797066"
},
{
"category": "external",
"summary": "798220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=798220"
},
{
"category": "external",
"summary": "798497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=798497"
},
{
"category": "external",
"summary": "798938",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=798938"
},
{
"category": "external",
"summary": "799478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=799478"
},
{
"category": "external",
"summary": "800366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=800366"
},
{
"category": "external",
"summary": "801160",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=801160"
},
{
"category": "external",
"summary": "801443",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=801443"
},
{
"category": "external",
"summary": "801970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=801970"
},
{
"category": "external",
"summary": "802644",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=802644"
},
{
"category": "external",
"summary": "802851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=802851"
},
{
"category": "external",
"summary": "802854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=802854"
},
{
"category": "external",
"summary": "802856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=802856"
},
{
"category": "external",
"summary": "803591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=803591"
},
{
"category": "external",
"summary": "804028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=804028"
},
{
"category": "external",
"summary": "806098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=806098"
},
{
"category": "external",
"summary": "807147",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=807147"
},
{
"category": "external",
"summary": "807555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=807555"
},
{
"category": "external",
"summary": "807751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=807751"
},
{
"category": "external",
"summary": "808371",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=808371"
},
{
"category": "external",
"summary": "808459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=808459"
},
{
"category": "external",
"summary": "808522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=808522"
},
{
"category": "external",
"summary": "808527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=808527"
},
{
"category": "external",
"summary": "808979",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=808979"
},
{
"category": "external",
"summary": "810100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=810100"
},
{
"category": "external",
"summary": "810157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=810157"
},
{
"category": "external",
"summary": "810241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=810241"
},
{
"category": "external",
"summary": "810559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=810559"
},
{
"category": "external",
"summary": "811227",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=811227"
},
{
"category": "external",
"summary": "811497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=811497"
},
{
"category": "external",
"summary": "811683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=811683"
},
{
"category": "external",
"summary": "813972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=813972"
},
{
"category": "external",
"summary": "814021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=814021"
},
{
"category": "external",
"summary": "814080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=814080"
},
{
"category": "external",
"summary": "815270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=815270"
},
{
"category": "external",
"summary": "815503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=815503"
},
{
"category": "external",
"summary": "815791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=815791"
},
{
"category": "external",
"summary": "816465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=816465"
},
{
"category": "external",
"summary": "816662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=816662"
},
{
"category": "external",
"summary": "817078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=817078"
},
{
"category": "external",
"summary": "817234",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=817234"
},
{
"category": "external",
"summary": "819014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=819014"
},
{
"category": "external",
"summary": "819498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=819498"
},
{
"category": "external",
"summary": "819499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=819499"
},
{
"category": "external",
"summary": "819636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=819636"
},
{
"category": "external",
"summary": "820461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=820461"
},
{
"category": "external",
"summary": "820869",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=820869"
},
{
"category": "external",
"summary": "831164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831164"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0748.json"
}
],
"title": "Red Hat Security Advisory: libvirt security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2024-11-22T04:53:21+00:00",
"generator": {
"date": "2024-11-22T04:53:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2012:0748",
"initial_release_date": "2012-06-19T15:21:00+00:00",
"revision_history": [
{
"date": "2012-06-19T15:21:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2012-06-19T15:31:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:53:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Storage Server 3",
"product": {
"name": "Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:storage:3:server:el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-0:0.9.10-21.el6.src",
"product": {
"name": "libvirt-0:0.9.10-21.el6.src",
"product_id": "libvirt-0:0.9.10-21.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.9.10-21.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"product": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"product_id": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.9.10-21.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"product": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"product_id": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@0.9.10-21.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.9.10-21.el6.x86_64",
"product": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64",
"product_id": "libvirt-client-0:0.9.10-21.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.9.10-21.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.9.10-21.el6.x86_64",
"product": {
"name": "libvirt-0:0.9.10-21.el6.x86_64",
"product_id": "libvirt-0:0.9.10-21.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.9.10-21.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.9.10-21.el6.x86_64",
"product": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64",
"product_id": "libvirt-python-0:0.9.10-21.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.9.10-21.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"product": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"product_id": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.9.10-21.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"product": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"product_id": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.9.10-21.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"product": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"product_id": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-lock-sanlock@0.9.10-21.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-client-0:0.9.10-21.el6.i686",
"product": {
"name": "libvirt-client-0:0.9.10-21.el6.i686",
"product_id": "libvirt-client-0:0.9.10-21.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.9.10-21.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.9.10-21.el6.i686",
"product": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686",
"product_id": "libvirt-devel-0:0.9.10-21.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.9.10-21.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.9.10-21.el6.i686",
"product": {
"name": "libvirt-0:0.9.10-21.el6.i686",
"product_id": "libvirt-0:0.9.10-21.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.9.10-21.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.9.10-21.el6.i686",
"product": {
"name": "libvirt-python-0:0.9.10-21.el6.i686",
"product_id": "libvirt-python-0:0.9.10-21.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.9.10-21.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:0.9.10-21.el6.s390x",
"product": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x",
"product_id": "libvirt-client-0:0.9.10-21.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.9.10-21.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.9.10-21.el6.s390x",
"product": {
"name": "libvirt-0:0.9.10-21.el6.s390x",
"product_id": "libvirt-0:0.9.10-21.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.9.10-21.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.9.10-21.el6.s390x",
"product": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x",
"product_id": "libvirt-devel-0:0.9.10-21.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.9.10-21.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.9.10-21.el6.s390x",
"product": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x",
"product_id": "libvirt-python-0:0.9.10-21.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.9.10-21.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"product": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"product_id": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.9.10-21.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:0.9.10-21.el6.s390",
"product": {
"name": "libvirt-client-0:0.9.10-21.el6.s390",
"product_id": "libvirt-client-0:0.9.10-21.el6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.9.10-21.el6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.9.10-21.el6.s390",
"product": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390",
"product_id": "libvirt-devel-0:0.9.10-21.el6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.9.10-21.el6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"product": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"product_id": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.9.10-21.el6?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:0.9.10-21.el6.ppc",
"product": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc",
"product_id": "libvirt-client-0:0.9.10-21.el6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.9.10-21.el6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.9.10-21.el6.ppc",
"product": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc",
"product_id": "libvirt-devel-0:0.9.10-21.el6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.9.10-21.el6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"product": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"product_id": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.9.10-21.el6?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libvirt-client-0:0.9.10-21.el6.ppc64",
"product": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64",
"product_id": "libvirt-client-0:0.9.10-21.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-client@0.9.10-21.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-0:0.9.10-21.el6.ppc64",
"product": {
"name": "libvirt-0:0.9.10-21.el6.ppc64",
"product_id": "libvirt-0:0.9.10-21.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt@0.9.10-21.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"product": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"product_id": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-devel@0.9.10-21.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-python-0:0.9.10-21.el6.ppc64",
"product": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64",
"product_id": "libvirt-python-0:0.9.10-21.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-python@0.9.10-21.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"product": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"product_id": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libvirt-debuginfo@0.9.10-21.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6ComputeNode"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Storage Server 3",
"product_id": "6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-RHS-Server-3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-0:0.9.10-21.el6.src"
},
"product_reference": "libvirt-0:0.9.10-21.el6.src",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-client-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-client-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-client-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-client-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-client-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-client-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-client-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-client-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-devel-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-devel-0:0.9.10-21.el6.ppc"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-devel-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-devel-0:0.9.10-21.el6.s390"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-devel-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-devel-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-devel-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-devel-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-lock-sanlock-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-python-0:0.9.10-21.el6.i686"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.i686",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-python-0:0.9.10-21.el6.ppc64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.ppc64",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-python-0:0.9.10-21.el6.s390x"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.s390x",
"relates_to_product_reference": "6Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libvirt-python-0:0.9.10-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation:libvirt-python-0:0.9.10-21.el6.x86_64"
},
"product_reference": "libvirt-python-0:0.9.10-21.el6.x86_64",
"relates_to_product_reference": "6Workstation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-2693",
"discovery_date": "2012-04-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "831164"
}
],
"notes": [
{
"category": "description",
"text": "libvirt, possibly before 0.9.12, does not properly assign USB devices to virtual machines when multiple devices have the same vendor and product ID, which might cause the wrong device to be associated with a guest and might allow local users to access unintended USB devices.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-optional:libvirt-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-0:0.9.10-21.el6.src",
"6Client-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-0:0.9.10-21.el6.i686",
"6Client:libvirt-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-0:0.9.10-21.el6.s390x",
"6Client:libvirt-0:0.9.10-21.el6.src",
"6Client:libvirt-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-client-0:0.9.10-21.el6.i686",
"6Client:libvirt-client-0:0.9.10-21.el6.ppc",
"6Client:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-client-0:0.9.10-21.el6.s390",
"6Client:libvirt-client-0:0.9.10-21.el6.s390x",
"6Client:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-devel-0:0.9.10-21.el6.i686",
"6Client:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Client:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-devel-0:0.9.10-21.el6.s390",
"6Client:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Client:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Client:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-python-0:0.9.10-21.el6.i686",
"6Client:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-python-0:0.9.10-21.el6.s390x",
"6Client:libvirt-python-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.src",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-0:0.9.10-21.el6.src",
"6ComputeNode:libvirt-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.src",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-0:0.9.10-21.el6.src",
"6Server-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-0:0.9.10-21.el6.i686",
"6Server:libvirt-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-0:0.9.10-21.el6.s390x",
"6Server:libvirt-0:0.9.10-21.el6.src",
"6Server:libvirt-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-client-0:0.9.10-21.el6.i686",
"6Server:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-client-0:0.9.10-21.el6.s390",
"6Server:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-python-0:0.9.10-21.el6.i686",
"6Server:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.src",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-0:0.9.10-21.el6.src",
"6Workstation:libvirt-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-client-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-client-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-client-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-client-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-python-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-python-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-python-0:0.9.10-21.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-2693"
},
{
"category": "external",
"summary": "RHBZ#831164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=831164"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2693",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2693"
}
],
"release_date": "2012-04-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2012-06-19T15:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-optional:libvirt-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-0:0.9.10-21.el6.src",
"6Client-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-0:0.9.10-21.el6.i686",
"6Client:libvirt-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-0:0.9.10-21.el6.s390x",
"6Client:libvirt-0:0.9.10-21.el6.src",
"6Client:libvirt-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-client-0:0.9.10-21.el6.i686",
"6Client:libvirt-client-0:0.9.10-21.el6.ppc",
"6Client:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-client-0:0.9.10-21.el6.s390",
"6Client:libvirt-client-0:0.9.10-21.el6.s390x",
"6Client:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-devel-0:0.9.10-21.el6.i686",
"6Client:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Client:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-devel-0:0.9.10-21.el6.s390",
"6Client:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Client:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Client:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-python-0:0.9.10-21.el6.i686",
"6Client:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-python-0:0.9.10-21.el6.s390x",
"6Client:libvirt-python-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.src",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-0:0.9.10-21.el6.src",
"6ComputeNode:libvirt-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.src",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-0:0.9.10-21.el6.src",
"6Server-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-0:0.9.10-21.el6.i686",
"6Server:libvirt-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-0:0.9.10-21.el6.s390x",
"6Server:libvirt-0:0.9.10-21.el6.src",
"6Server:libvirt-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-client-0:0.9.10-21.el6.i686",
"6Server:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-client-0:0.9.10-21.el6.s390",
"6Server:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-python-0:0.9.10-21.el6.i686",
"6Server:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.src",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-0:0.9.10-21.el6.src",
"6Workstation:libvirt-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-client-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-client-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-client-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-client-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-python-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-python-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-python-0:0.9.10-21.el6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2012:0748"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.7,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Client-optional:libvirt-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-0:0.9.10-21.el6.src",
"6Client-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Client-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-0:0.9.10-21.el6.i686",
"6Client:libvirt-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-0:0.9.10-21.el6.s390x",
"6Client:libvirt-0:0.9.10-21.el6.src",
"6Client:libvirt-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-client-0:0.9.10-21.el6.i686",
"6Client:libvirt-client-0:0.9.10-21.el6.ppc",
"6Client:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-client-0:0.9.10-21.el6.s390",
"6Client:libvirt-client-0:0.9.10-21.el6.s390x",
"6Client:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Client:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-devel-0:0.9.10-21.el6.i686",
"6Client:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Client:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-devel-0:0.9.10-21.el6.s390",
"6Client:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Client:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Client:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Client:libvirt-python-0:0.9.10-21.el6.i686",
"6Client:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Client:libvirt-python-0:0.9.10-21.el6.s390x",
"6Client:libvirt-python-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.src",
"6ComputeNode-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6ComputeNode-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-0:0.9.10-21.el6.src",
"6ComputeNode:libvirt-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-client-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.ppc",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.s390",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.i686",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.ppc64",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.s390x",
"6ComputeNode:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.src",
"6Server-RHS-Server-3:libvirt-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.i686",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server-RHS-Server-3:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-0:0.9.10-21.el6.src",
"6Server-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-0:0.9.10-21.el6.i686",
"6Server:libvirt-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-0:0.9.10-21.el6.s390x",
"6Server:libvirt-0:0.9.10-21.el6.src",
"6Server:libvirt-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-client-0:0.9.10-21.el6.i686",
"6Server:libvirt-client-0:0.9.10-21.el6.ppc",
"6Server:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-client-0:0.9.10-21.el6.s390",
"6Server:libvirt-client-0:0.9.10-21.el6.s390x",
"6Server:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Server:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-devel-0:0.9.10-21.el6.i686",
"6Server:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Server:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-devel-0:0.9.10-21.el6.s390",
"6Server:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Server:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Server:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Server:libvirt-python-0:0.9.10-21.el6.i686",
"6Server:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Server:libvirt-python-0:0.9.10-21.el6.s390x",
"6Server:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.src",
"6Workstation-optional:libvirt-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.s390",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.i686",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.s390x",
"6Workstation-optional:libvirt-python-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-0:0.9.10-21.el6.src",
"6Workstation:libvirt-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-client-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-client-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-client-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-client-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-client-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-client-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-debuginfo-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.ppc",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.s390",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-devel-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-lock-sanlock-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-lock-sanlock-0:0.9.10-21.el6.x86_64",
"6Workstation:libvirt-python-0:0.9.10-21.el6.i686",
"6Workstation:libvirt-python-0:0.9.10-21.el6.ppc64",
"6Workstation:libvirt-python-0:0.9.10-21.el6.s390x",
"6Workstation:libvirt-python-0:0.9.10-21.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored"
}
]
}
FKIE_CVE-2012-2693
Vulnerability from fkie_nvd - Published: 2012-06-17 03:41 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "01916DA0-D0B0-4355-B72D-76B2E9B05988",
"versionEndIncluding": "0.9.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFF5EF5-280A-499B-BD63-361EDC49A923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C2A0DD5B-AFDD-4DA4-B19C-2CA73FA9B477",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DE616C79-74E0-4876-83D7-BE04CB954F92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "87FF4782-A017-4D6F-9588-BE0AD4AA04E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4B7FDA56-4C79-4D79-9EDA-8A936C7D8DE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FF62226E-E4FE-4AF5-86A2-344148158A22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C540F8A3-E12A-403B-81D2-CDB28DE03E47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A0900588-EBF9-4459-B1D7-588B72E40689",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FE650A9D-D12D-43C5-B276-B3116CF096F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "359F1970-822B-4430-86EB-15091B2B4338",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D08DB661-40DF-4234-9F6B-2EE0746FAC8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E86D1293-6881-4F9D-B245-E16040921DF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C49F1101-0845-478F-BEA1-67185A763D37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4F1FDF3E-87F8-4CBF-99F8-DBB03C7D2318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DA319732-E860-459E-9C20-ED31D90510DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "06B16020-5330-4F99-8DD3-8B4037E22CFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BCA6D83-281F-4B28-9CB2-253614017B5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FEBBD0C7-F9D3-48D4-8D76-1FAFFB049300",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C97CB42C-C89F-4BE6-80AC-A020EBF369FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FCC2F2D6-90E3-4306-A29A-0A507BDF889C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AB533B81-AFF3-442E-A499-555F2181F64D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "53AD34A3-9097-4375-BB30-CAED13987396",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "80E37E3B-18A8-4D34-9400-2C18D0DBAAAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "36EAE07C-284D-4BEB-ABDF-28C157B3B90B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E28C5275-39D4-4C7C-A064-70161FE35802",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "643D7C4C-6BD9-49CE-A7FD-819300CA955C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "77476F3F-A914-4EC6-9488-189BD9E1AE6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B22C7B3D-169D-45CC-B1C1-9864991B3E05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3D6D1F10-2908-42E0-8D8F-1FBBC804505D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FC9ABBF2-B1AD-446A-A3D2-E103D1B411A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "450BD95B-5CE1-49E7-B6DB-6C14D9115CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "508578FC-BDC7-4B44-9F98-BD6CD657F57B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FD25F37B-C666-4EDB-AD77-CCE04A800348",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B8903EA9-D354-4C9E-B308-653689534AFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F811BE37-6F53-4663-819F-E954787C345B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2886A659-24BD-483B-8FCD-5BC21573EE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65FD148D-0088-47D5-AAC1-E0E990F9D170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "84613074-CFA0-4C0B-B896-0751F652EA71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2BCCF73F-8542-4955-ACD6-44F199D49CB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "05C7EF0F-C069-424A-9B3F-D07C72450ADA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5F25DF6A-34D5-4D5B-AFAF-7A21202460EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B67C29ED-2975-47F0-AE75-875A380ECC56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EC90B806-1FB3-434E-A664-2842AD3BA9CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8DCDC5B5-1DD4-4FF4-8AB4-D38F5418B873",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0054B43A-F844-47C8-B03A-01696117B7E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A5C78A50-0F41-405C-9ABA-EE088D0ABE60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8322F4E2-0AD0-497B-871E-233C0E0F1490",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E41CEF32-4998-41D5-B971-12E7F4E39FB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E43FD74C-5986-4E9E-9C4F-9891133084A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8D504B27-7BD0-4CB1-B8CA-76B7C537A4C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CBFD9B43-52BA-4FF9-84A1-369B1A96A166",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "10EE76EF-44D3-4645-B1E7-5BCFB4CB4204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "934215BC-33D1-453F-B49B-23B52E580214",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*",
"matchCriteriaId": "F274792B-F190-4A23-A551-6B07EA4028B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D67FBC-4009-4FC1-B0CF-AA3C1505C2F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E2059834-5A26-4DB9-B400-DBBE15690AAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F2F6277D-6732-44BA-91B4-D57877E011BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2553A171-A830-4540-8CC6-51275F72AAEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "61C2C484-7AAB-475C-A44E-6D9DCF597DD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "04A75CCF-28E1-44CC-962C-C56A4F64B370",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B0E8A1AF-740A-454C-8019-B52654589603",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "F040825C-C457-40A1-A04C-F362289E13F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3327FB7D-92DB-479F-BF1C-2565C8F1B25C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "48F55C0A-3E6E-4E24-81D7-F023728E486A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "ACB7C00E-DF4E-40AF-A503-202A2FE03D5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6AB4E8A8-2B6C-4287-937B-C67A97EAB67A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "libvirt, possibly before 0.9.12, does not properly assign USB devices to virtual machines when multiple devices have the same vendor and product ID, which might cause the wrong device to be associated with a guest and might allow local users to access unintended USB devices."
},
{
"lang": "es",
"value": "libvirt, posiblemente anterior a v0.9.12, no se asignan adecuadamente los dispositivos USB a las m\u00e1quinas virtuales cuando varios dispositivos tienen el mismo proveedor y la misma identificaci\u00f3n de producto, lo que podr\u00eda provocar que el dispositivo equivocado sea asociado con un invitado lo que podr\u00eda podr\u00eda permitir a usuarios locales acceder a los dispositivos USB no deseados."
}
],
"id": "CVE-2012-2693",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.7,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 1.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-06-17T03:41:42.203",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0748.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0127.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2012/06/11/2"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2012/06/11/3"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://www.redhat.com/archives/libvir-list/2012-April/msg01494.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0748.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0127.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2012/06/11/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2012/06/11/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://www.redhat.com/archives/libvir-list/2012-April/msg01494.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
GSD-2012-2693
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2012-2693",
"description": "libvirt, possibly before 0.9.12, does not properly assign USB devices to virtual machines when multiple devices have the same vendor and product ID, which might cause the wrong device to be associated with a guest and might allow local users to access unintended USB devices.",
"id": "GSD-2012-2693",
"references": [
"https://www.suse.com/security/cve/CVE-2012-2693.html",
"https://access.redhat.com/errata/RHSA-2013:0127",
"https://access.redhat.com/errata/RHSA-2012:0748",
"https://linux.oracle.com/cve/CVE-2012-2693.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2012-2693"
],
"details": "libvirt, possibly before 0.9.12, does not properly assign USB devices to virtual machines when multiple devices have the same vendor and product ID, which might cause the wrong device to be associated with a guest and might allow local users to access unintended USB devices.",
"id": "GSD-2012-2693",
"modified": "2023-12-13T01:20:16.828205Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2693",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "libvirt, possibly before 0.9.12, does not properly assign USB devices to virtual machines when multiple devices have the same vendor and product ID, which might cause the wrong device to be associated with a guest and might allow local users to access unintended USB devices."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://rhn.redhat.com/errata/RHSA-2012-0748.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0748.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2013-0127.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0127.html"
},
{
"name": "http://www.openwall.com/lists/oss-security/2012/06/11/2",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/06/11/2"
},
{
"name": "http://www.openwall.com/lists/oss-security/2012/06/11/3",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2012/06/11/3"
},
{
"name": "https://www.redhat.com/archives/libvir-list/2012-April/msg01494.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/libvir-list/2012-April/msg01494.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.9.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.9.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.4.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.9.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.9.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.9.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.9.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "0.9.11",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.8.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.7.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.9.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:libvirt:0.9.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2012-2693"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "libvirt, possibly before 0.9.12, does not properly assign USB devices to virtual machines when multiple devices have the same vendor and product ID, which might cause the wrong device to be associated with a guest and might allow local users to access unintended USB devices."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[libvirt] 20120428 [PATCH 0/3] usb devices with same vendor, productID hotplug support",
"refsource": "MLIST",
"tags": [
"Patch"
],
"url": "https://www.redhat.com/archives/libvir-list/2012-April/msg01494.html"
},
{
"name": "[oss-security] 20120611 Re: CVE request -- libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2012/06/11/3"
},
{
"name": "[oss-security] 20120611 CVE request -- libvirt: address bus= device= when identicle vendor ID/product IDs usb devices attached are ignored",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2012/06/11/2"
},
{
"name": "RHSA-2012:0748",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0748.html"
},
{
"name": "RHSA-2013:0127",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0127.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.7,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 1.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2013-01-15T04:30Z",
"publishedDate": "2012-06-17T03:41Z"
}
}
}
GHSA-P575-V2MX-34M6
Vulnerability from github – Published: 2022-05-17 05:16 – Updated: 2022-05-17 05:16libvirt, possibly before 0.9.12, does not properly assign USB devices to virtual machines when multiple devices have the same vendor and product ID, which might cause the wrong device to be associated with a guest and might allow local users to access unintended USB devices.
{
"affected": [],
"aliases": [
"CVE-2012-2693"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2012-06-17T03:41:00Z",
"severity": "LOW"
},
"details": "libvirt, possibly before 0.9.12, does not properly assign USB devices to virtual machines when multiple devices have the same vendor and product ID, which might cause the wrong device to be associated with a guest and might allow local users to access unintended USB devices.",
"id": "GHSA-p575-v2mx-34m6",
"modified": "2022-05-17T05:16:58Z",
"published": "2022-05-17T05:16:58Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2693"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/libvir-list/2012-April/msg01494.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0748.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0127.html"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2012/06/11/2"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2012/06/11/3"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.