Action not permitted
Modal body text goes here.
cve-2014-3660
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:50:17.928Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "59903", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59903" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html" }, { "name": "DSA-3057", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3057" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT205030" }, { "name": "70644", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/70644" }, { "name": "openSUSE-SU-2014:1330", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/attachment.cgi?id=944444\u0026action=diff" }, { "name": "61966", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61966" }, { "name": "61965", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61965" }, { "name": "USN-2389-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2389-1" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "APPLE-SA-2015-08-13-3", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html" }, { "name": "[oss-security] 20141017 libxml2 issue: billioun laughs variant (CVE-2014-3660)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/10/17/7" }, { "name": "MDVSA-2014:244", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:244" }, { "name": "RHSA-2014:1655", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1655.html" }, { "name": "RHSA-2014:1885", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1885.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1149084" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "name": "61991", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61991" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "openSUSE-SU-2015:2372", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT205031" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-16T00:00:00", "descriptions": [ { "lang": "en", "value": "parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the \"billion laughs\" attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-06T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "59903", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59903" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html" }, { "name": "DSA-3057", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3057" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT205030" }, { "name": "70644", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/70644" }, { "name": "openSUSE-SU-2014:1330", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/attachment.cgi?id=944444\u0026action=diff" }, { "name": "61966", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61966" }, { "name": "61965", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61965" }, { "name": "USN-2389-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2389-1" }, { "name": "APPLE-SA-2015-08-13-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "APPLE-SA-2015-08-13-3", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html" }, { "name": "[oss-security] 20141017 libxml2 issue: billioun laughs variant (CVE-2014-3660)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/10/17/7" }, { "name": "MDVSA-2014:244", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:244" }, { "name": "RHSA-2014:1655", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1655.html" }, { "name": "RHSA-2014:1885", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1885.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1149084" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "name": "61991", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61991" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "openSUSE-SU-2015:2372", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT205031" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3660", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the \"billion laughs\" attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "59903", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59903" }, { "name": "https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html", "refsource": "MISC", "url": "https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html" }, { "name": "DSA-3057", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3057" }, { "name": "https://support.apple.com/kb/HT205030", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT205030" }, { "name": "70644", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70644" }, { "name": "openSUSE-SU-2014:1330", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html" }, { "name": "https://bugzilla.redhat.com/attachment.cgi?id=944444\u0026action=diff", "refsource": "MISC", "url": "https://bugzilla.redhat.com/attachment.cgi?id=944444\u0026action=diff" }, { "name": "61966", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61966" }, { "name": "61965", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61965" }, { "name": "USN-2389-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2389-1" }, { "name": "APPLE-SA-2015-08-13-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "APPLE-SA-2015-08-13-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html" }, { "name": "[oss-security] 20141017 libxml2 issue: billioun laughs variant (CVE-2014-3660)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/10/17/7" }, { "name": "MDVSA-2014:244", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:244" }, { "name": "RHSA-2014:1655", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1655.html" }, { "name": "RHSA-2014:1885", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1885.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1149084", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1149084" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "name": "61991", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61991" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "openSUSE-SU-2015:2372", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" }, { "name": "https://support.apple.com/kb/HT205031", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT205031" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-3660", "datePublished": "2014-11-04T16:00:00", "dateReserved": "2014-05-14T00:00:00", "dateUpdated": "2024-08-06T10:50:17.928Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-3660\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-11-04T16:55:06.043\",\"lastModified\":\"2016-12-08T03:05:40.590\",\"vulnStatus\":\"Modified\",\"evaluatorComment\":\"\u003ca href=\\\"http://cwe.mitre.org/data/definitions/611.html\\\" target=\\\"_blank\\\"\u003eCWE-611: Improper Restriction of XML External Entity Reference (\u0027XXE\u0027)\u003c/a\u003e\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the \\\"billion laughs\\\" attack.\"},{\"lang\":\"es\",\"value\":\"parser.c en libxml2 anterior a 2.9.2 no previene debidamente la expansi\u00f3n de entidades incluso cuando la substituci\u00f3n de entidades haya sido deshabilitada, lo que permite a atacantes dependientes de contexto causar una denegaci\u00f3n de servicio (consumo de CPU) a trav\u00e9s de un documento XML manipualdo que contiene un n\u00famero grande de referencias de entidades anidadas, una variante del ataque del \u0027bill\u00f3n de risas\u0027.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.9.1\",\"matchCriteriaId\":\"18BCA403-8F0F-4564-BE7E-1DE10408B54B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"586C0FAB-E288-4EFB-8946-4535971F23F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15236DDC-0095-4253-9113-61F76EFC0769\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98F95AB1-D3D0-4E39-B135-4B55991845CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"392E4AA7-00D2-45B1-9FA7-C1C7C37431F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7839A86-59AA-400C-BF29-18E612B8EB4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F9A211A-5C44-4BDC-9676-3B7B937835B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BECA085A-BEF1-4AD2-ABBA-069CE2642796\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E66BF7BC-5B5C-40BB-B826-3CC9DBAB53D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F330D609-31EB-4B4C-B007-ACEABA557F54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9E2F05B-B298-489C-9E44-62E0A199E148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"070B2F1F-9A99-4A20-9BA9-CF175D482DA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25DC5AE4-9DEA-4828-96F0-57BACB6C9B25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE26E6D-53FF-4001-8F25-C112635CB74E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1210A8D-5359-4FD4-963F-506200AA20AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA748E50-798F-40EA-B252-0A166DEEB120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B9E7CC-D552-4C9A-909E-42D375452E09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06C20B5C-16E7-4C1B-A2DB-8EB4B9A7045D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A901B3-B0F4-4D2B-8CAF-25938219B657\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12FCBA01-D739-4BA2-83F5-D41A6DF91F1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFC8C43D-84C7-4C0C-8DD1-66206D665C35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E60C1B4-BBC1-4E2B-8323-A7E059EF6BEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B677850-4FE9-4522-ADAE-42C5D17D4A7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BB7931B-55AA-4735-8AAB-9F3A9E9C0123\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4A5B9AF-7F82-4EEC-A776-587C6DD44448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94D33392-DD5C-4704-BECF-69D416F9F2C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1BA896F-07D7-4B93-939B-B6CDD1DCA87C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"647CA5AD-5AC2-448E-8445-62837F413361\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37D4241B-A328-45F0-9FAB-CEE20DC7432E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAAD77C4-84EC-4924-90F8-35A2375AA6A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A124C5A-C72C-4623-925E-378FF40671EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ACD2FD4-E884-4FC5-842B-86AAE06D9E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14A9036D-1474-4097-9E70-09F7BBA2826C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8884CF6-2F5B-465F-841B-3C69EC3BE3BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A699B966-3756-4D5B-8693-0678EEDD8AD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1E50FED-4BAD-4D04-98C3-C2427E086C1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70880522-BBC0-4D5C-8DA3-245E189FA1C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A8BA1A0-F8E7-4B93-B667-D012C91F831E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27662848-9CD5-43BC-9A1B-8C6EBACCCC21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C967E50C-E7AA-49D0-A055-20CA083CA232\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA398ACA-73C2-4093-AD35-E30161C96C25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757B5A74-6B7B-4F01-9891-9F9E510074C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C10CC4C-3A9C-4AD0-A7C1-ACF781BF20D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E67FD94-4E96-4FCC-990B-4C0A5C599ED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E7DDE27-9DE8-4E45-AFA2-AFFEA8F0D917\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92CEEDA7-5DFC-4DB0-989E-F356E5CF65A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25D60B58-3558-4244-A5B3-8D16F53A9588\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5DB409B-795F-4F8A-85E1-0B4E66AE9D48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"457C47ED-A429-42AE-9FF9-978D605BACFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C20B9D5-9E10-4B6D-8095-B2A63EDB8D16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9087E4FE-661F-4803-BB3B-09D2699265E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C2D01CF-9FCE-41F8-997E-EA9BDCCD8C76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E1C7A6-DCA7-4760-B1B6-EFB256978CFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F1E7CFF-E4B3-4B31-BE23-C187544E9488\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81EDD077-5183-4588-8DB1-93A0597AAA34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"530FE28C-0D51-4BF9-AE43-D65F9913B48B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F030053E-2292-42E2-8435-0CFBDDE688DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0258377-DD8B-4FA6-B075-E8489C83CEAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69E0BD23-38C6-43C0-870F-00B13F7C91D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D3350E-5186-4DC8-9D1B-59068A469496\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F76783D0-63F8-48A7-85FE-E5E8DBFA223D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52AE89B2-C1A3-48C8-AEB5-4B0D757AE361\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ACA170D-21DB-47CD-AD73-2DEB2A2439F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFC48A66-7D1F-4446-BC50-6C1A1DF819E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0A86D90-C64E-4850-8D6E-94D3C0789241\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06A50725-AC7A-4FDB-887A-3DCB369C943D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D463EC3C-88F1-46D9-ADB6-6283DC23B0B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F8E361-E6D3-4666-B18D-928D550FD5D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6948CD9-8489-46BA-9159-24C842490702\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35C43087-760E-482A-B34E-141A29AC57A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"669211F7-90EA-47AB-A787-34DD79DF8E25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"025B16D8-1023-4D47-BADD-C1E838B47D88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"320E691F-D417-4D81-A223-C46FEFFD908A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3B06B40-327D-4EFA-AD19-DA1CA7D50B4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB8BEC58-AB2A-4953-A2E8-338EB894A494\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABDE6C9A-4F24-42B4-8AA3-3EBC97190322\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44FB2813-BE9F-46A8-864B-435D883CA0FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9DF1336-F831-4507-B45E-574BDE8AA8BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33268B2F-3591-48D9-B123-92E3ABF157F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0830367A-9FB3-4291-88C0-38A471DFD22B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73E4EB1B-2E8B-4504-AB05-F4D4E6B038E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5815E25-5305-4A32-81B3-89DB1D5C1AC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AD69C98-11AB-4BB5-A91A-F029BA0E1DB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98CF3A74-B9F8-4689-B81C-F579D827DA5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DBD9C7D-CD0B-4B5B-BEC2-F67610DEDE2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"798F7A01-F006-4589-82F8-943F81015693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A1C90C5-1B77-4BE5-ACDA-1F15D3F2A000\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36940C55-BFD4-4C77-A26B-C0F273EAC2EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ECB753E-430C-4DBD-9063-506E749A21CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EBD3E93-1624-4B1D-8F9A-5683ADA4983E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"551B91B8-7A5A-4E5D-AAED-76705F8A2829\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D8135B1-FB22-4755-A5ED-CDB16E3E85A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B4685BF-394A-4426-980A-2B1D37737C06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A68008-7392-4BE4-AB30-24D2BA124E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63F37BF5-D4D2-43AB-841A-E9AC32A68452\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB8A074B-069A-4520-8E3C-AB614C31B68A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D77DE5FD-060A-4AD6-A925-4E9EF186C835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7069A49C-038C-4E7B-AF03-4D90D5734414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87E895B9-5AF7-4A1F-B740-B3E13DE3254E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FD29EFD-1ADB-4349-8E7D-EA6B34B0F6DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC720A50-9EF5-4B73-86D1-AE87D402611E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"464942E8-EDF3-4ECB-B907-FFCDBC9079C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1246C0E-DCAC-405E-ADCE-3D16D659C567\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5703D8EC-259B-49C3-AADE-916227DEB96F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"184B40E3-28FD-49A4-9560-5E26293D7D08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CCE8BBA-6721-4257-9F2E-23AEB104564E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF2A3107-5F12-407E-9009-7F42B09299E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8928F415-C124-4B4A-9D59-40AC6845AFD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"955673D9-2912-48A2-93C9-10430290A4AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xmlsoft:libxml2:2.9.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"268661C2-7A45-4743-8A09-48B3EE21212E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.10.4\",\"matchCriteriaId\":\"7883E465-932D-4C11-AA54-97E44181F906\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"5D37DF0F-F863-45AC-853A-3E04F9FEC7CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D8B549B-E57B-4DFE-8A13-CAB06B5356B3\"}]}]}],\"references\":[{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1655.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1885.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/59903\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61965\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61966\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/61991\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2014/dsa-3057\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2014:244\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2014/10/17/7\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/70644\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2389-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/attachment.cgi?id=944444\u0026action=diff\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1149084\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://support.apple.com/kb/HT205030\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT205031\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html\",\"source\":\"secalert@redhat.com\"}]}}" } }
ghsa-xrph-4qjj-gj25
Vulnerability from github
parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
{ "affected": [], "aliases": [ "CVE-2014-3660" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-11-04T16:55:00Z", "severity": "MODERATE" }, "details": "parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the \"billion laughs\" attack.", "id": "GHSA-xrph-4qjj-gj25", "modified": "2022-05-17T03:22:58Z", "published": "2022-05-17T03:22:58Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3660" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/attachment.cgi?id=944444\u0026action=diff" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1149084" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT205030" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT205031" }, { "type": "WEB", "url": "https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1655.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1885.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/59903" }, { "type": "WEB", "url": "http://secunia.com/advisories/61965" }, { "type": "WEB", "url": "http://secunia.com/advisories/61966" }, { "type": "WEB", "url": "http://secunia.com/advisories/61991" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-3057" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:244" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2014/10/17/7" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/70644" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2389-1" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2014_1655
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated libxml2 packages that fix one security issue are now available for\nRed Hat Enterprise Linux 6 and 7.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The libxml2 library is a development toolbox providing the implementation\nof various XML standards.\n\nA denial of service flaw was found in libxml2, a library providing support\nto read, modify and write XML and HTML files. A remote attacker could\nprovide a specially crafted XML file that, when processed by an application\nusing libxml2, would lead to excessive CPU consumption (denial of service)\nbased on excessive entity substitutions, even if entity substitution was\ndisabled, which is the parser default behavior. (CVE-2014-3660)\n\nAll libxml2 users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. The desktop must be\nrestarted (log out, then log back in) for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1655", "url": "https://access.redhat.com/errata/RHSA-2014:1655" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1149084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1149084" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1655.json" } ], "title": "Red Hat Security Advisory: libxml2 security update", "tracking": { "current_release_date": "2024-11-05T18:38:16+00:00", "generator": { "date": "2024-11-05T18:38:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2014:1655", "initial_release_date": "2014-10-16T17:49:06+00:00", "revision_history": [ { "date": "2014-10-16T17:49:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-10-16T17:49:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T18:38:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libxml2-0:2.9.1-5.el7_0.1.x86_64", "product": { "name": "libxml2-0:2.9.1-5.el7_0.1.x86_64", "product_id": "libxml2-0:2.9.1-5.el7_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.9.1-5.el7_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "product": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "product_id": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.1-5.el7_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "product": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "product_id": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-python@2.9.1-5.el7_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "product": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "product_id": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-static@2.9.1-5.el7_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "product": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "product_id": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.9.1-5.el7_0.1?arch=x86_64" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "product": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "product_id": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.7.6-17.el6_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "product": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "product_id": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-static@2.7.6-17.el6_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "product": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "product_id": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-python@2.7.6-17.el6_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "libxml2-0:2.7.6-17.el6_6.1.x86_64", "product": { "name": "libxml2-0:2.7.6-17.el6_6.1.x86_64", "product_id": "libxml2-0:2.7.6-17.el6_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.7.6-17.el6_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "product": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "product_id": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.7.6-17.el6_6.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libxml2-0:2.9.1-5.el7_0.1.i686", "product": { "name": "libxml2-0:2.9.1-5.el7_0.1.i686", "product_id": "libxml2-0:2.9.1-5.el7_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.9.1-5.el7_0.1?arch=i686" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "product": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "product_id": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.1-5.el7_0.1?arch=i686" } } }, { "category": "product_version", "name": "libxml2-static-0:2.9.1-5.el7_0.1.i686", "product": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.i686", "product_id": "libxml2-static-0:2.9.1-5.el7_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-static@2.9.1-5.el7_0.1?arch=i686" } } }, { "category": "product_version", "name": "libxml2-devel-0:2.9.1-5.el7_0.1.i686", "product": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.i686", "product_id": "libxml2-devel-0:2.9.1-5.el7_0.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.9.1-5.el7_0.1?arch=i686" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "product": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "product_id": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.7.6-17.el6_6.1?arch=i686" } } }, { "category": "product_version", "name": "libxml2-static-0:2.7.6-17.el6_6.1.i686", "product": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.i686", "product_id": "libxml2-static-0:2.7.6-17.el6_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-static@2.7.6-17.el6_6.1?arch=i686" } } }, { "category": "product_version", "name": "libxml2-0:2.7.6-17.el6_6.1.i686", "product": { "name": "libxml2-0:2.7.6-17.el6_6.1.i686", "product_id": "libxml2-0:2.7.6-17.el6_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.7.6-17.el6_6.1?arch=i686" } } }, { "category": "product_version", "name": "libxml2-devel-0:2.7.6-17.el6_6.1.i686", "product": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.i686", "product_id": "libxml2-devel-0:2.7.6-17.el6_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.7.6-17.el6_6.1?arch=i686" } } }, { "category": "product_version", "name": "libxml2-python-0:2.7.6-17.el6_6.1.i686", "product": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.i686", "product_id": "libxml2-python-0:2.7.6-17.el6_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-python@2.7.6-17.el6_6.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "libxml2-0:2.9.1-5.el7_0.1.src", "product": { "name": "libxml2-0:2.9.1-5.el7_0.1.src", "product_id": "libxml2-0:2.9.1-5.el7_0.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.9.1-5.el7_0.1?arch=src" } } }, { "category": "product_version", "name": "libxml2-0:2.7.6-17.el6_6.1.src", "product": { "name": "libxml2-0:2.7.6-17.el6_6.1.src", "product_id": "libxml2-0:2.7.6-17.el6_6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.7.6-17.el6_6.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "product": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "product_id": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.9.1-5.el7_0.1?arch=ppc64" } } }, { "category": "product_version", "name": "libxml2-0:2.9.1-5.el7_0.1.ppc64", "product": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc64", "product_id": "libxml2-0:2.9.1-5.el7_0.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.9.1-5.el7_0.1?arch=ppc64" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "product": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "product_id": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.1-5.el7_0.1?arch=ppc64" } } }, { "category": "product_version", "name": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "product": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "product_id": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-python@2.9.1-5.el7_0.1?arch=ppc64" } } }, { "category": "product_version", "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "product": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "product_id": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-static@2.9.1-5.el7_0.1?arch=ppc64" } } }, { "category": "product_version", "name": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "product": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "product_id": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-python@2.7.6-17.el6_6.1?arch=ppc64" } } }, { "category": "product_version", "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "product": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "product_id": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.7.6-17.el6_6.1?arch=ppc64" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "product": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "product_id": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.7.6-17.el6_6.1?arch=ppc64" } } }, { "category": "product_version", "name": "libxml2-0:2.7.6-17.el6_6.1.ppc64", "product": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc64", "product_id": "libxml2-0:2.7.6-17.el6_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.7.6-17.el6_6.1?arch=ppc64" } } }, { "category": "product_version", "name": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "product": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "product_id": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-static@2.7.6-17.el6_6.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "product": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "product_id": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.9.1-5.el7_0.1?arch=ppc" } } }, { "category": "product_version", "name": "libxml2-0:2.9.1-5.el7_0.1.ppc", "product": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc", "product_id": "libxml2-0:2.9.1-5.el7_0.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.9.1-5.el7_0.1?arch=ppc" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "product": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "product_id": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.1-5.el7_0.1?arch=ppc" } } }, { "category": "product_version", "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc", "product": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc", "product_id": "libxml2-static-0:2.9.1-5.el7_0.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-static@2.9.1-5.el7_0.1?arch=ppc" } } }, { "category": "product_version", "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "product": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "product_id": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.7.6-17.el6_6.1?arch=ppc" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "product": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "product_id": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.7.6-17.el6_6.1?arch=ppc" } } }, { "category": "product_version", "name": "libxml2-0:2.7.6-17.el6_6.1.ppc", "product": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc", "product_id": "libxml2-0:2.7.6-17.el6_6.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.7.6-17.el6_6.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390", "product": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390", "product_id": "libxml2-devel-0:2.9.1-5.el7_0.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.9.1-5.el7_0.1?arch=s390" } } }, { "category": "product_version", "name": "libxml2-0:2.9.1-5.el7_0.1.s390", "product": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390", "product_id": "libxml2-0:2.9.1-5.el7_0.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.9.1-5.el7_0.1?arch=s390" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "product": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "product_id": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.1-5.el7_0.1?arch=s390" } } }, { "category": "product_version", "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390", "product": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390", "product_id": "libxml2-static-0:2.9.1-5.el7_0.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-static@2.9.1-5.el7_0.1?arch=s390" } } }, { "category": "product_version", "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390", "product": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390", "product_id": "libxml2-devel-0:2.7.6-17.el6_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.7.6-17.el6_6.1?arch=s390" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "product": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "product_id": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.7.6-17.el6_6.1?arch=s390" } } }, { "category": "product_version", "name": "libxml2-0:2.7.6-17.el6_6.1.s390", "product": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390", "product_id": "libxml2-0:2.7.6-17.el6_6.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.7.6-17.el6_6.1?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "product": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "product_id": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.9.1-5.el7_0.1?arch=s390x" } } }, { "category": "product_version", "name": "libxml2-0:2.9.1-5.el7_0.1.s390x", "product": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390x", "product_id": "libxml2-0:2.9.1-5.el7_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.9.1-5.el7_0.1?arch=s390x" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "product": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "product_id": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.1-5.el7_0.1?arch=s390x" } } }, { "category": "product_version", "name": "libxml2-python-0:2.9.1-5.el7_0.1.s390x", "product": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.s390x", "product_id": "libxml2-python-0:2.9.1-5.el7_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-python@2.9.1-5.el7_0.1?arch=s390x" } } }, { "category": "product_version", "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390x", "product": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390x", "product_id": "libxml2-static-0:2.9.1-5.el7_0.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-static@2.9.1-5.el7_0.1?arch=s390x" } } }, { "category": "product_version", "name": "libxml2-python-0:2.7.6-17.el6_6.1.s390x", "product": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.s390x", "product_id": "libxml2-python-0:2.7.6-17.el6_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-python@2.7.6-17.el6_6.1?arch=s390x" } } }, { "category": "product_version", "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "product": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "product_id": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.7.6-17.el6_6.1?arch=s390x" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "product": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "product_id": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.7.6-17.el6_6.1?arch=s390x" } } }, { "category": "product_version", "name": "libxml2-0:2.7.6-17.el6_6.1.s390x", "product": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390x", "product_id": "libxml2-0:2.7.6-17.el6_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.7.6-17.el6_6.1?arch=s390x" } } }, { "category": "product_version", "name": "libxml2-static-0:2.7.6-17.el6_6.1.s390x", "product": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.s390x", "product_id": "libxml2-static-0:2.7.6-17.el6_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-static@2.7.6-17.el6_6.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.src", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.src", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.src", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.src", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.src", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.src", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.src", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.src", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.s390", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64" }, "product_reference": "libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.src", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.src", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Client-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.src", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.src", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.src", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.src", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Server-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.src", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.src", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.i686", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.ppc", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.s390", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64" }, "product_reference": "libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3660", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2014-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1149084" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in libxml2, a library providing support to read, modify and write XML and HTML files. A remote attacker could provide a specially crafted XML file that, when processed by an application using libxml2, would lead to excessive CPU consumption (denial of service) based on excessive entity substitutions, even if entity substitution was disabled, which is the parser default behavior.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: denial of service via recursive entity expansion", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Client-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Client-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Client-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Client-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Client-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Client-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Client-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Client-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Client-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Client-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Client-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Client-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Client-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Client-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Client-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Client-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Server-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Server-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Server-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Server-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Server-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Server-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Server-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Server-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Server-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Server-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Server-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Server-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Server-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Server-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Server-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Server-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Workstation-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Workstation-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Workstation-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Workstation-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Workstation-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Workstation-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Workstation-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Workstation-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Client-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Client-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Client-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Client-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Client-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Client-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Server-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Server-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Server-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Server-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Server-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Server-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Workstation-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Workstation-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3660" }, { "category": "external", "summary": "RHBZ#1149084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1149084" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3660", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3660" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3660", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3660" } ], "release_date": "2014-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-16T17:49:06+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Client-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Client-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Client-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Client-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Client-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Client-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Client-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Client-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Client-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Client-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Client-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Client-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Client-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Client-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Client-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Client-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Server-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Server-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Server-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Server-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Server-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Server-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Server-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Server-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Server-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Server-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Server-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Server-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Server-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Server-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Server-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Server-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Workstation-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Workstation-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Workstation-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Workstation-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Workstation-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Workstation-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Workstation-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Workstation-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Client-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Client-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Client-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Client-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Client-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Client-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Server-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Server-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Server-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Server-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Server-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Server-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Workstation-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Workstation-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1655" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Client-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Client-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Client-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Client-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Client-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Client-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Client-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Client-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Client-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Client-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Client-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Client-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Client-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Client-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Client-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Client-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Client-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Client-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Client-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Client-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Client-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Client-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6ComputeNode-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6ComputeNode-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6ComputeNode-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6ComputeNode-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6ComputeNode-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6ComputeNode-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Server-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Server-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Server-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Server-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Server-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Server-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Server-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Server-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Server-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Server-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Server-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Server-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Server-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Server-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Server-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Server-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Server-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Server-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Server-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Server-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Server-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Server-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Workstation-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Workstation-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Workstation-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Workstation-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Workstation-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Workstation-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Workstation-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.i686", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.s390x", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.src", "6Workstation-optional-6.6.z:libxml2-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.i686", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.s390x", "6Workstation-optional-6.6.z:libxml2-debuginfo-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.i686", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.s390x", "6Workstation-optional-6.6.z:libxml2-devel-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.i686", "6Workstation-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.s390x", "6Workstation-optional-6.6.z:libxml2-python-0:2.7.6-17.el6_6.1.x86_64", "6Workstation-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.i686", "6Workstation-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.ppc64", "6Workstation-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.s390x", "6Workstation-optional-6.6.z:libxml2-static-0:2.7.6-17.el6_6.1.x86_64", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Client-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Client-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Client-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Client-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Client-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Client-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Client-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Client-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Client-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Client-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Client-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Client-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Client-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Client-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7ComputeNode-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7ComputeNode-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7ComputeNode-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Server-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Server-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Server-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Server-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Server-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Server-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Server-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Server-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Server-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Server-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Server-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Server-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Server-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Server-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Workstation-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Workstation-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Workstation-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Workstation-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Workstation-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.i686", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.s390x", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.src", "7Workstation-optional-7.0.Z:libxml2-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.i686", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.s390x", "7Workstation-optional-7.0.Z:libxml2-debuginfo-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.i686", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.s390x", "7Workstation-optional-7.0.Z:libxml2-devel-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.s390x", "7Workstation-optional-7.0.Z:libxml2-python-0:2.9.1-5.el7_0.1.x86_64", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.i686", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.ppc64", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.s390x", "7Workstation-optional-7.0.Z:libxml2-static-0:2.9.1-5.el7_0.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: denial of service via recursive entity expansion" } ] }
rhsa-2014_1885
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated libxml2 packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The libxml2 library is a development toolbox providing the implementation\nof various XML standards.\n\nA denial of service flaw was found in libxml2, a library providing support\nto read, modify and write XML and HTML files. A remote attacker could\nprovide a specially crafted XML file that, when processed by an application\nusing libxml2, would lead to excessive CPU consumption (denial of service)\nbased on excessive entity substitutions, even if entity substitution was\ndisabled, which is the parser default behavior. (CVE-2014-3660)\n\nAll libxml2 users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. The desktop must be\nrestarted (log out, then log back in) for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1885", "url": "https://access.redhat.com/errata/RHSA-2014:1885" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1149084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1149084" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1885.json" } ], "title": "Red Hat Security Advisory: libxml2 security update", "tracking": { "current_release_date": "2024-11-05T18:41:45+00:00", "generator": { "date": "2024-11-05T18:41:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2014:1885", "initial_release_date": "2014-11-20T18:51:48+00:00", "revision_history": [ { "date": "2014-11-20T18:51:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-11-20T18:51:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T18:41:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libxml2-0:2.6.26-2.1.25.el5_11.src", "product": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.src", "product_id": "libxml2-0:2.6.26-2.1.25.el5_11.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.6.26-2.1.25.el5_11?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.i386", "product": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.i386", "product_id": "libxml2-devel-0:2.6.26-2.1.25.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.6.26-2.1.25.el5_11?arch=i386" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386", "product": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386", "product_id": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.26-2.1.25.el5_11?arch=i386" } } }, { "category": "product_version", "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.i386", "product": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.i386", "product_id": "libxml2-python-0:2.6.26-2.1.25.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-python@2.6.26-2.1.25.el5_11?arch=i386" } } }, { "category": "product_version", "name": "libxml2-0:2.6.26-2.1.25.el5_11.i386", "product": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.i386", "product_id": "libxml2-0:2.6.26-2.1.25.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.6.26-2.1.25.el5_11?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64", "product": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64", "product_id": "libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.6.26-2.1.25.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64", "product": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64", "product_id": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.26-2.1.25.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64", "product": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64", "product_id": "libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-python@2.6.26-2.1.25.el5_11?arch=x86_64" } } }, { "category": "product_version", "name": "libxml2-0:2.6.26-2.1.25.el5_11.x86_64", "product": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.x86_64", "product_id": "libxml2-0:2.6.26-2.1.25.el5_11.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.6.26-2.1.25.el5_11?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.ppc", "product": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.ppc", "product_id": "libxml2-python-0:2.6.26-2.1.25.el5_11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-python@2.6.26-2.1.25.el5_11?arch=ppc" } } }, { "category": "product_version", "name": "libxml2-0:2.6.26-2.1.25.el5_11.ppc", "product": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.ppc", "product_id": "libxml2-0:2.6.26-2.1.25.el5_11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.6.26-2.1.25.el5_11?arch=ppc" } } }, { "category": "product_version", "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc", "product": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc", "product_id": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.6.26-2.1.25.el5_11?arch=ppc" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc", "product": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc", "product_id": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.26-2.1.25.el5_11?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libxml2-0:2.6.26-2.1.25.el5_11.ppc64", "product": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.ppc64", "product_id": "libxml2-0:2.6.26-2.1.25.el5_11.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.6.26-2.1.25.el5_11?arch=ppc64" } } }, { "category": "product_version", "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64", "product": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64", "product_id": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.6.26-2.1.25.el5_11?arch=ppc64" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64", "product": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64", "product_id": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.26-2.1.25.el5_11?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.s390x", "product": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.s390x", "product_id": "libxml2-python-0:2.6.26-2.1.25.el5_11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-python@2.6.26-2.1.25.el5_11?arch=s390x" } } }, { "category": "product_version", "name": "libxml2-0:2.6.26-2.1.25.el5_11.s390x", "product": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.s390x", "product_id": "libxml2-0:2.6.26-2.1.25.el5_11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.6.26-2.1.25.el5_11?arch=s390x" } } }, { "category": "product_version", "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x", "product": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x", "product_id": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.6.26-2.1.25.el5_11?arch=s390x" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x", "product": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x", "product_id": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.26-2.1.25.el5_11?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libxml2-0:2.6.26-2.1.25.el5_11.s390", "product": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.s390", "product_id": "libxml2-0:2.6.26-2.1.25.el5_11.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.6.26-2.1.25.el5_11?arch=s390" } } }, { "category": "product_version", "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390", "product": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390", "product_id": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.6.26-2.1.25.el5_11?arch=s390" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390", "product": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390", "product_id": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.26-2.1.25.el5_11?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.ia64", "product": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.ia64", "product_id": "libxml2-python-0:2.6.26-2.1.25.el5_11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-python@2.6.26-2.1.25.el5_11?arch=ia64" } } }, { "category": "product_version", "name": "libxml2-0:2.6.26-2.1.25.el5_11.ia64", "product": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.ia64", "product_id": "libxml2-0:2.6.26-2.1.25.el5_11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2@2.6.26-2.1.25.el5_11?arch=ia64" } } }, { "category": "product_version", "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64", "product": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64", "product_id": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-devel@2.6.26-2.1.25.el5_11?arch=ia64" } } }, { "category": "product_version", "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64", "product": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64", "product_id": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libxml2-debuginfo@2.6.26-2.1.25.el5_11?arch=ia64" } } } ], "category": "architecture", "name": "ia64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.i386" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ia64" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc64" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.s390", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390x" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.src" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.src", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.x86_64" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.i386" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.i386" }, "product_reference": "libxml2-python-0:2.6.26-2.1.25.el5_11.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ia64" }, "product_reference": "libxml2-python-0:2.6.26-2.1.25.el5_11.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ppc" }, "product_reference": "libxml2-python-0:2.6.26-2.1.25.el5_11.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.s390x" }, "product_reference": "libxml2-python-0:2.6.26-2.1.25.el5_11.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64" }, "product_reference": "libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.i386" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ia64" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc64" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.ppc64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.s390", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390x" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.src" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.src", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.x86_64" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.i386" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.i386" }, "product_reference": "libxml2-python-0:2.6.26-2.1.25.el5_11.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ia64" }, "product_reference": "libxml2-python-0:2.6.26-2.1.25.el5_11.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ppc" }, "product_reference": "libxml2-python-0:2.6.26-2.1.25.el5_11.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.s390x" }, "product_reference": "libxml2-python-0:2.6.26-2.1.25.el5_11.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64" }, "product_reference": "libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.i386" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ia64" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc64" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.s390", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390x" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.src" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.src", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-0:2.6.26-2.1.25.el5_11.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.x86_64" }, "product_reference": "libxml2-0:2.6.26-2.1.25.el5_11.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64" }, "product_reference": "libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.i386" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64" }, "product_reference": "libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.i386" }, "product_reference": "libxml2-python-0:2.6.26-2.1.25.el5_11.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ia64" }, "product_reference": "libxml2-python-0:2.6.26-2.1.25.el5_11.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ppc" }, "product_reference": "libxml2-python-0:2.6.26-2.1.25.el5_11.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.s390x" }, "product_reference": "libxml2-python-0:2.6.26-2.1.25.el5_11.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64" }, "product_reference": "libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64", "relates_to_product_reference": "5Server-5.11.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3660", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2014-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1149084" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in libxml2, a library providing support to read, modify and write XML and HTML files. A remote attacker could provide a specially crafted XML file that, when processed by an application using libxml2, would lead to excessive CPU consumption (denial of service) based on excessive entity substitutions, even if entity substitution was disabled, which is the parser default behavior.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: denial of service via recursive entity expansion", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.i386", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ia64", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390x", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.src", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.i386", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.i386", "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ia64", "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ppc", "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.s390x", "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.i386", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ia64", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390x", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.src", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.i386", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.i386", "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ia64", "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ppc", "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.s390x", "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.i386", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ia64", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc64", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390x", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.src", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.x86_64", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.i386", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64", "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.i386", "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ia64", "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ppc", "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.s390x", "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3660" }, { "category": "external", "summary": "RHBZ#1149084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1149084" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3660", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3660" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3660", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3660" } ], "release_date": "2014-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-11-20T18:51:48+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.i386", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ia64", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390x", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.src", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.i386", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.i386", "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ia64", "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ppc", "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.s390x", "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.i386", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ia64", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390x", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.src", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.i386", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.i386", "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ia64", "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ppc", "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.s390x", "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.i386", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ia64", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc64", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390x", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.src", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.x86_64", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.i386", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64", "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.i386", "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ia64", "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ppc", "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.s390x", "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1885" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.i386", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ia64", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390x", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.src", "5Client-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x", "5Client-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.i386", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x", "5Client-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.i386", "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ia64", "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ppc", "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.s390x", "5Client-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.i386", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ia64", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390x", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.src", "5Client-Workstation-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x", "5Client-Workstation-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.i386", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x", "5Client-Workstation-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64", "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.i386", "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ia64", "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ppc", "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.s390x", "5Client-Workstation-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.i386", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ia64", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.ppc64", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.s390x", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.src", "5Server-5.11.Z:libxml2-0:2.6.26-2.1.25.el5_11.x86_64", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.i386", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ia64", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.ppc64", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.s390x", "5Server-5.11.Z:libxml2-debuginfo-0:2.6.26-2.1.25.el5_11.x86_64", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.i386", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ia64", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.ppc64", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.s390x", "5Server-5.11.Z:libxml2-devel-0:2.6.26-2.1.25.el5_11.x86_64", "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.i386", "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ia64", "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.ppc", "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.s390x", "5Server-5.11.Z:libxml2-python-0:2.6.26-2.1.25.el5_11.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: denial of service via recursive entity expansion" } ] }
wid-sec-w-2023-1614
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Tenable Nessus Network Monitor ist eine L\u00f6sung zur Inventarisierung und \u00dcberwachung von Netzwerkger\u00e4ten und den genutzten Protokollen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Tenable Security Nessus Network Monitor ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1614 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1614.json" }, { "category": "self", "summary": "WID-SEC-2023-1614 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1614" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2023-34 vom 2023-10-25", "url": "https://de.tenable.com/security/tns-2023-34" }, { "category": "external", "summary": "Tenable Security Advisory vom 2023-06-29", "url": "https://de.tenable.com/security/tns-2023-23" } ], "source_lang": "en-US", "title": "Tenable Security Nessus Network Monitor: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-10-25T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:33:55.765+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1614", "initial_release_date": "2023-06-29T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-07-03T22:00:00.000+00:00", "number": "2", "summary": "Produkt berichtigt" }, { "date": "2023-10-25T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Tenable aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Tenable Security Nessus Network Monitor \u003c 6.2.2", "product": { "name": "Tenable Security Nessus Network Monitor \u003c 6.2.2", "product_id": "T028403", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus_network_monitor:6.2.2" } } } ], "category": "vendor", "name": "Tenable Security" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-32067", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-32067" }, { "cve": "CVE-2023-31147", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-31147" }, { "cve": "CVE-2023-31130", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-31130" }, { "cve": "CVE-2023-31124", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-31124" }, { "cve": "CVE-2023-29469", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-29469" }, { "cve": "CVE-2023-28484", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-28484" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-1255", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-1255" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2022-4904", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-4904" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-31160", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-31160" }, { "cve": "CVE-2022-29824", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-29824" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-23395", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-23395" }, { "cve": "CVE-2022-23308", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-23308" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2022-22576" }, { "cve": "CVE-2021-45346", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2021-45346" }, { "cve": "CVE-2021-3672", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2021-3672" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3541", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2021-3541" }, { "cve": "CVE-2021-3537", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2021-3537" }, { "cve": "CVE-2021-3518", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2021-3518" }, { "cve": "CVE-2021-3517", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2021-3517" }, { "cve": "CVE-2021-31239", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2021-31239" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-20227", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2021-20227" }, { "cve": "CVE-2020-9327", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2020-9327" }, { "cve": "CVE-2020-7595", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2020-7595" }, { "cve": "CVE-2020-35527", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2020-35527" }, { "cve": "CVE-2020-35525", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2020-35525" }, { "cve": "CVE-2020-24977", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2020-24977" }, { "cve": "CVE-2020-15358", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2020-15358" }, { "cve": "CVE-2020-14155", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2020-14155" }, { "cve": "CVE-2020-13871", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2020-13871" }, { "cve": "CVE-2020-13632", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2020-13632" }, { "cve": "CVE-2020-13631", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2020-13631" }, { "cve": "CVE-2020-13630", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2020-13630" }, { "cve": "CVE-2020-13435", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2020-13435" }, { "cve": "CVE-2020-13434", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2020-13434" }, { "cve": "CVE-2020-11656", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2020-11656" }, { "cve": "CVE-2020-11655", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2020-11655" }, { "cve": "CVE-2019-9937", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-9937" }, { "cve": "CVE-2019-9936", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-9936" }, { "cve": "CVE-2019-8457", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-8457" }, { "cve": "CVE-2019-5815", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-5815" }, { "cve": "CVE-2019-20838", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-20838" }, { "cve": "CVE-2019-20388", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-20388" }, { "cve": "CVE-2019-20218", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-20218" }, { "cve": "CVE-2019-19959", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-19959" }, { "cve": "CVE-2019-19956", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-19956" }, { "cve": "CVE-2019-19926", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-19926" }, { "cve": "CVE-2019-19925", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-19925" }, { "cve": "CVE-2019-19924", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-19924" }, { "cve": "CVE-2019-19923", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-19923" }, { "cve": "CVE-2019-19880", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-19880" }, { "cve": "CVE-2019-19646", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-19646" }, { "cve": "CVE-2019-19645", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-19645" }, { "cve": "CVE-2019-19603", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-19603" }, { "cve": "CVE-2019-19317", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-19317" }, { "cve": "CVE-2019-19244", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-19244" }, { "cve": "CVE-2019-19242", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-19242" }, { "cve": "CVE-2019-16168", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-16168" }, { "cve": "CVE-2019-13118", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-13118" }, { "cve": "CVE-2019-13117", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-13117" }, { "cve": "CVE-2019-12900", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-12900" }, { "cve": "CVE-2019-11068", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2019-11068" }, { "cve": "CVE-2018-9251", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2018-9251" }, { "cve": "CVE-2018-14567", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2018-14567" }, { "cve": "CVE-2018-14404", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2018-14404" }, { "cve": "CVE-2017-9050", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2017-9050" }, { "cve": "CVE-2017-9049", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2017-9049" }, { "cve": "CVE-2017-9048", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2017-9048" }, { "cve": "CVE-2017-9047", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2017-9047" }, { "cve": "CVE-2017-8872", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2017-8872" }, { "cve": "CVE-2017-7376", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2017-7376" }, { "cve": "CVE-2017-7375", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2017-7375" }, { "cve": "CVE-2017-5969", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2017-5969" }, { "cve": "CVE-2017-5130", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2017-5130" }, { "cve": "CVE-2017-5029", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2017-5029" }, { "cve": "CVE-2017-18258", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2017-18258" }, { "cve": "CVE-2017-16932", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2017-16932" }, { "cve": "CVE-2017-16931", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2017-16931" }, { "cve": "CVE-2017-15412", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2017-15412" }, { "cve": "CVE-2017-1000381", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2017-1000381" }, { "cve": "CVE-2017-1000061", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2017-1000061" }, { "cve": "CVE-2016-9598", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-9598" }, { "cve": "CVE-2016-9597", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-9597" }, { "cve": "CVE-2016-9596", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-9596" }, { "cve": "CVE-2016-5180", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-5180" }, { "cve": "CVE-2016-5131", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-5131" }, { "cve": "CVE-2016-4658", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-4658" }, { "cve": "CVE-2016-4609", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-4609" }, { "cve": "CVE-2016-4607", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-4607" }, { "cve": "CVE-2016-4483", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-4483" }, { "cve": "CVE-2016-4449", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-4449" }, { "cve": "CVE-2016-4448", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-4448" }, { "cve": "CVE-2016-4447", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-4447" }, { "cve": "CVE-2016-3709", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-3709" }, { "cve": "CVE-2016-3705", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-3705" }, { "cve": "CVE-2016-3627", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-3627" }, { "cve": "CVE-2016-3189", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-3189" }, { "cve": "CVE-2016-2073", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-2073" }, { "cve": "CVE-2016-1840", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-1840" }, { "cve": "CVE-2016-1839", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-1839" }, { "cve": "CVE-2016-1838", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-1838" }, { "cve": "CVE-2016-1837", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-1837" }, { "cve": "CVE-2016-1836", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-1836" }, { "cve": "CVE-2016-1834", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-1834" }, { "cve": "CVE-2016-1833", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-1833" }, { "cve": "CVE-2016-1762", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-1762" }, { "cve": "CVE-2016-1684", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-1684" }, { "cve": "CVE-2016-1683", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2016-1683" }, { "cve": "CVE-2015-9019", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2015-9019" }, { "cve": "CVE-2015-8806", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2015-8806" }, { "cve": "CVE-2015-8710", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2015-8710" }, { "cve": "CVE-2015-8317", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2015-8317" }, { "cve": "CVE-2015-8242", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2015-8242" }, { "cve": "CVE-2015-8241", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2015-8241" }, { "cve": "CVE-2015-8035", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2015-8035" }, { "cve": "CVE-2015-7995", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2015-7995" }, { "cve": "CVE-2015-7942", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2015-7942" }, { "cve": "CVE-2015-7941", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2015-7941" }, { "cve": "CVE-2015-7500", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2015-7500" }, { "cve": "CVE-2015-7499", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2015-7499" }, { "cve": "CVE-2015-7498", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2015-7498" }, { "cve": "CVE-2015-7497", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2015-7497" }, { "cve": "CVE-2015-5312", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2015-5312" }, { "cve": "CVE-2014-3660", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2014-3660" }, { "cve": "CVE-2013-4520", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2013-4520" }, { "cve": "CVE-2013-2877", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2013-2877" }, { "cve": "CVE-2013-1969", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2013-1969" }, { "cve": "CVE-2013-0339", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2013-0339" }, { "cve": "CVE-2013-0338", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2013-0338" }, { "cve": "CVE-2012-6139", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2012-6139" }, { "cve": "CVE-2012-5134", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2012-5134" }, { "cve": "CVE-2012-2871", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2012-2871" }, { "cve": "CVE-2012-2870", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2012-2870" }, { "cve": "CVE-2012-0841", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2012-0841" }, { "cve": "CVE-2011-3970", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2011-3970" }, { "cve": "CVE-2011-1944", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2011-1944" }, { "cve": "CVE-2011-1202", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2011-1202" }, { "cve": "CVE-2010-4494", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2010-4494" }, { "cve": "CVE-2010-4008", "notes": [ { "category": "description", "text": "In Tenable Security Nessus Network Monitor existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in Komponenten von Drittanbietern wie c-ares, curl, libbzip2, libpcre, libxml2, sqlite und OpenSSL. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Rechte." } ], "release_date": "2023-06-29T22:00:00Z", "title": "CVE-2010-4008" } ] }
var-201411-0450
Vulnerability from variot
parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack. This vulnerability Billion Laughs Vulnerability that has been mutated from the attack. Supplementary information : CWE Vulnerability type by CWE-611: Improper Restriction of XML External Entity Reference ('XXE') (XML Inappropriate restrictions on external entity references ) Has been identified. Libxml2 is prone to a denial-of-service vulnerability. Successful exploit will allow attackers to consume large amounts of memory and cause a crash through a specially crafted XML containing malicious attributes. It supports multiple encoding formats, XPath analysis, Well-formed and valid verification, etc.
Background
libxml2 is the XML C parser and toolkit developed for the Gnome project.
Workaround
There is no known workaround at this time.
Resolution
All libxml2 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.9.2"
Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying these packages.
References
[ 1 ] CVE-2014-3660 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3660
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201412-06.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us.
License
Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . ============================================================================ Ubuntu Security Notice USN-2389-1 October 27, 2014
libxml2 vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
libxml2 could be made to consume resources if it processed a specially crafted file.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 LTS: libxml2 2.9.1+dfsg1-3ubuntu4.4
Ubuntu 12.04 LTS: libxml2 2.7.8.dfsg-5.1ubuntu4.11
Ubuntu 10.04 LTS: libxml2 2.7.6.dfsg-1ubuntu1.15
After a standard system update you need to reboot your computer to make all the necessary changes. The verification of md5 checksums and GPG signatures is performed automatically for you. Summary
VMware vCenter Server, ESXi, Workstation, Player and Fusion address several security issues. Relevant Releases
VMware Workstation 10.x prior to version 10.0.5
VMware Player 6.x prior to version 6.0.5
VMware Fusion 7.x prior to version 7.0.1 VMware Fusion 6.x prior to version 6.0.5
vCenter Server 5.5 prior to Update 2d
ESXi 5.5 without patch ESXi550-201403102-SG, ESXi550-201501101-SG ESXi 5.1 without patch ESXi510-201404101-SG ESXi 5.0 without patch ESXi500-201405101-SG
- Problem Description
a. VMware ESXi, Workstation, Player, and Fusion host privilege escalation vulnerability
VMware ESXi, Workstation, Player and Fusion contain an arbitrary
file write issue. Exploitation this issue may allow for privilege
escalation on the host.
The vulnerability does not allow for privilege escalation from
the guest Operating System to the host or vice-versa. This means
that host memory can not be manipulated from the Guest Operating
System.
Mitigation
For ESXi to be affected, permissions must have been added to ESXi
(or a vCenter Server managing it) for a virtual machine
administrator role or greater.
VMware would like to thank Shanon Olsson for reporting this issue to
us through JPCERT.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2014-8370 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any not affected
Fusion 6.x any 6.0.5
ESXi 5.5 ESXi ESXi550-201403102-SG
ESXi 5.1 ESXi ESXi510-201404101-SG
ESXi 5.0 ESXi ESXi500-201405101-SG
b. VMware Workstation, Player, and Fusion Denial of Service vulnerability
VMware Workstation, Player, and Fusion contain an input validation
issue in the Host Guest File System (HGFS). This issue may allow
for a Denial of Service of the Guest Operating system.
VMware would like to thank Peter Kamensky from Digital Security for
reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2015-1043 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any 7.0.1
Fusion 6.x any 6.0.5
c. VMware ESXi, Workstation, and Player Denial of Service vulnerability
VMware ESXi, Workstation, and Player contain an input
validation issue in VMware Authorization process (vmware-authd).
This issue may allow for a Denial of Service of the host. On
VMware ESXi and on Workstation running on Linux the Denial of
Service would be partial.
VMware would like to thank Dmitry Yudin @ret5et for reporting
this issue to us through HP's Zero Day Initiative.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2015-1044 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any not affected
Fusion 6.x any not affected
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi ESXi510-201410101-SG
ESXi 5.0 ESXi not affected
d. Update to VMware vCenter Server and ESXi for OpenSSL 1.0.1 and 0.9.8 package
The OpenSSL library is updated to version 1.0.1j or 0.9.8zc
to resolve multiple security issues.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2014-3513, CVE-2014-3567,
CVE-2014-3566 ("POODLE") and CVE-2014-3568 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
vCenter Server 5.5 any Update 2d*
vCenter Server 5.1 any patch pending
vCenter Server 5.0 any patch pending
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi patch pending
ESXi 5.0 ESXi patch pending
* The VMware vCenter 5.5 SSO component will be
updated in a later release
e.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2014-3660 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi patch pending
ESXi 5.0 ESXi patch pending
- Solution
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware Workstation 10.x
https://www.vmware.com/go/downloadworkstation
VMware Player 6.x
https://www.vmware.com/go/downloadplayer
VMware Fusion 7.x and 6.x
https://www.vmware.com/go/downloadplayer
vCenter Server
Downloads and Documentation: https://www.vmware.com/go/download-vsphere
ESXi 5.5 Update 2d
File: update-from-esxi5.5-5.5_update01.zip md5sum: 5773844efc7d8e43135de46801d6ea25 sha1sum: 6518355d260e81b562c66c5016781db9f077161f http://kb.vmware.com/kb/2065832 update-from-esxi5.5-5.5_update01 contains ESXi550-201403102-SG
ESXi 5.5
File: ESXi550-201501001.zip md5sum: b0f2edd9ad17d0bae5a11782aaef9304 sha1sum: 9cfcb1e2cf1bb845f0c96c5472d6b3a66f025dd1 http://kb.vmware.com/kb/2099265 ESXi550-201501001.zip contains ESXi550-201501101-SG
ESXi 5.1
File: ESXi510-201404001.zip md5sum: 9dc3c9538de4451244a2b62d247e52c4 sha1sum: 6b1ea36a2711665a670afc9ae37cdd616bb6da66 http://kb.vmware.com/kb/2070666 ESXi510-201404001 contains ESXi510-201404101-SG
ESXi 5.0
File: ESXi500-201405001.zip md5sum: 7cd1afc97f5f1e4b4132c90835f92e1d sha1sum: 4bd77eeb5d7fc65bbb6f25762b0fa74fbb9679d5 http://kb.vmware.com/kb/2075521 ESXi500-201405001 contains ESXi500-201405101-SG
- Change log
2015-01-27 VMSA-2015-0001 Initial security advisory in conjunction with the release of VMware Workstation 10.0.5, VMware Player 6.0.5, vCenter Server 5.5 Update 2d and, ESXi 5.5 Patches released on 2015-01-27. Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories http://www.vmware.com/security/advisories
Consolidated list of VMware Security Advisories http://kb.vmware.com/kb/2078735
VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html
Twitter https://twitter.com/VMwareSRC
Copyright 2015 VMware Inc. All rights reserved. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2015-08-13-3 iOS 8.4.1
iOS 8.4.1 is now available and addresses the following:
AppleFileConduit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A maliciously crafted afc command may allow access to protected parts of the filesystem Description: An issue existed in the symbolic linking mechanism of afc. This issue was addressed by adding additional path checks. CVE-ID CVE-2015-5746 : evad3rs, TaiG Jailbreak Team
Air Traffic Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: AirTraffic may have allowed access to protected parts of the filesystem Description: A path traversal issue existed in asset handling. This was addressed with improved validation. CVE-ID CVE-2015-5766 : TaiG Jailbreak Team
Backup Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to create symlinks to protected regions of the disk Description: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization. CVE-ID CVE-2015-5752 : TaiG Jailbreak Team
bootp Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious Wi-Fi network may be able to determine networks a device has previously accessed Description: Upon connecting to a Wi-Fi network, iOS may have broadcast MAC addresses of previously accessed networks via the DNAv4 protocol. This issue was addressed through disabling DNAv4 on unencrypted Wi-Fi networks. CVE-ID CVE-2015-3778 : Piers O'Hanlon of Oxford Internet Institute, University of Oxford (on the EPSRC Being There project)
Certificate UI Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker with a privileged network position may be able to accept untrusted certificates from the lock screen Description: Under certain circumstances, the device may have presented a certificate trust dialog while in a locked state. This issue was addressed through improved state management. CVE-ID CVE-2015-3756 : Andy Grant of NCC Group
CloudKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to access the iCloud user record of a previously signed in user Description: A state inconsistency existed in CloudKit when signing out users. This issue was addressed through improved state handling. CVE-ID CVE-2015-3782 : Deepkanwal Plaha of University of Toronto
CFPreferences Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious app may be able to read other apps' managed preferences Description: An issue existed in the third-party app sandbox. This issue was addressed by improving the third-party sandbox profile. CVE-ID CVE-2015-3793 : Andreas Weinlein of the Appthority Mobility Threat Team
Code Signing Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to execute unsigned code Description: An issue existed that allowed unsigned code to be appended to signed code in a specially crafted executable file. This issue was addressed through improved code signature validation. CVE-ID CVE-2015-3806 : TaiG Jailbreak Team
Code Signing Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A specially crafted executable file could allow unsigned, malicious code to execute Description: An issue existed in the way multi-architecture executable files were evaluated that could have allowed unsigned code to be executed. This issue was addressed through improved validation of executable files. CVE-ID CVE-2015-3803 : TaiG Jailbreak Team
Code Signing Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A local user may be able to execute unsigned code Description: A validation issue existed in the handling of Mach-O files. This was addressed by adding additional checks. CVE-ID CVE-2015-3802 : TaiG Jailbreak Team CVE-2015-3805 : TaiG Jailbreak Team
CoreMedia Playback Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in CoreMedia Playback. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5777 : Apple CVE-2015-5778 : Apple
CoreText Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2015-5755 : John Villamil (@day6reak), Yahoo Pentest Team CVE-2015-5761 : John Villamil (@day6reak), Yahoo Pentest Team
DiskImages Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Processing a maliciously crafted DMG file may lead to an unexpected application termination or arbitrary code execution with system privileges Description: A memory corruption issue existed in parsing of malformed DMG images. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3800 : Frank Graziano of the Yahoo Pentest Team
FontParser Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2015-3804 : Apple CVE-2015-5756 : John Villamil (@day6reak), Yahoo Pentest Team CVE-2015-5775 : Apple
ImageIO Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Processing a maliciously crafted .tiff file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the processing of .tiff files. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-5758 : Apple
ImageIO Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may result in the disclosure of process memory Description: An uninitialized memory access issue existed in ImageIO's handling of PNG images. Visiting a malicious website may result in sending data from process memory to the website. This issue was addressed through improved memory initialization and additional validation of PNG images. CVE-ID CVE-2015-5781 : Michal Zalewski
ImageIO Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may result in the disclosure of process memory Description: An uninitialized memory access issue existed in ImageIO's handling of TIFF images. Visiting a malicious website may result in sending data from process memory to the website. This issue is addressed through improved memory initialization and additional validation of TIFF images. CVE-ID CVE-2015-5782 : Michal Zalewski
IOKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Parsing a maliciously crafted plist may lead to an unexpected application termination or arbitrary code execution with system privileges Description: A memory corruption existed in processing of malformed plists. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3776 : Teddy Reed of Facebook Security, Patrick Stein (@jollyjinx) of Jinx Germany
IOHIDFamily Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A local user may be able to execute arbitrary code with system privileges Description: A buffer overflow issue existed in IOHIDFamily. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5774 : TaiG Jailbreak Team
Kernel Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to determine kernel memory layout Description: An issue existed in the mach_port_space_info interface, which could have led to the disclosure of kernel memory layout. This was addressed by disabling the mach_port_space_info interface. CVE-ID CVE-2015-3766 : Cererdlong of Alibaba Mobile Security Team, @PanguTeam
Kernel Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An integer overflow existed in the handling of IOKit functions. This issue was addressed through improved validation of IOKit API arguments. CVE-ID CVE-2015-3768 : Ilja van Sprundel
Libc Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Processing a maliciously crafted regular expression may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the TRE library. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3796 : Ian Beer of Google Project Zero CVE-2015-3797 : Ian Beer of Google Project Zero CVE-2015-3798 : Ian Beer of Google Project Zero
Libinfo Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in handling AF_INET6 sockets. This issue was addressed by improved memory handling. CVE-ID CVE-2015-5776 : Apple
libpthread Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in handling syscalls. This issue was addressed through improved lock state checking. CVE-ID CVE-2015-5757 : Lufeng Li of Qihoo 360
libxml2 Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Parsing a maliciously crafted XML document may lead to disclosure of user information Description: A memory corruption issue existed in parsing of XML files. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3807 : Michal Zalewski
libxml2 Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Multiple vulnerabilities existed in libxml2 versions prior to 2.9.2, the most serious of which may allow a remote attacker to cause a denial of service Description: Multiple vulnerabilities existed in libxml2 versions prior to 2.9.2. These were addressed by updating libxml2 to version 2.9.2. CVE-ID CVE-2012-6685 : Felix Groebert of Google CVE-2014-0191 : Felix Groebert of Google CVE-2014-3660 : Felix Groebert of Google
libxpc Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in handling of malformed XPC messages. This issue was improved through improved bounds checking. CVE-ID CVE-2015-3795 : Mathew Rowley
Location Framework Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A local user may be able to modify protected parts of the filesystem Description: A symbolic link issue was addressed through improved path validation. CVE-ID CVE-2015-3759 : Cererdlong of Alibaba Mobile Security Team
MobileInstallation Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious enterprise application may be able to replace extensions for other apps Description: An issue existed in the install logic for universal provisioning profile apps, which allowed a collision to occur with existing bundle IDs. This issue was addressed through improved bundle ID validation. CVE-ID CVE-2015-5770 : FireEye
MSVDX Driver Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Viewing a malicious video may lead to a unexpected system termination Description: A denial of service issue was addressed through improved memory handling. CVE-ID CVE-2015-5769 : Proteas of Qihoo 360 Nirvan Team
Office Viewer Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Parsing a maliciously crafted XML file may lead to disclosure of user information Description: An external entity reference issue existed in XML file parsing. This issue was addressed through improved parsing. CVE-ID CVE-2015-3784 : Bruno Morisson of INTEGRITY S.A.
QL Office Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Parsing a maliciously crafted office document may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in parsing of office documents. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5773 : Apple
Safari Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a malicious website may lead to user interface spoofing Description: A malicious website could open another site and prompt for user input without a way for the user to tell where the prompt originated. The issue was addressed by displaying the prompt's origin to the user. CVE-ID CVE-2015-3729 : Code Audit Labs of VulnHunt.com
Safari Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious website may trigger an infinite number of alert messages Description: An issue existed where a malicious or hacked website could show infinite alert messages and make users believe their browser was locked. The issue was addressed through throttling of JavaScript alerts. CVE-ID CVE-2015-3763
Sandbox_profiles Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An malicious app may be able to read other apps' managed preferences Description: An issue existed in the third-party app sandbox. This issue was addressed by improving the third-party sandbox profile. CVE-ID CVE-2015-5749 : Andreas Weinlein of the Appthority Mobility Threat Team
UIKit WebView Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to initiate FaceTime calls without user authorization Description: An issue existed in the parsing of FaceTime URLs within WebViews. This issue was addressed through improved URL validation. CVE-ID CVE-2015-3758 : Brian Simmons of Salesforce, Guillaume Ross
WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2015-3730 : Apple CVE-2015-3731 : Apple CVE-2015-3732 : Apple CVE-2015-3733 : Apple CVE-2015-3734 : Apple CVE-2015-3735 : Apple CVE-2015-3736 : Apple CVE-2015-3737 : Apple CVE-2015-3738 : Apple CVE-2015-3739 : Apple CVE-2015-3740 : Apple CVE-2015-3741 : Apple CVE-2015-3742 : Apple CVE-2015-3743 : Apple CVE-2015-3744 : Apple CVE-2015-3745 : Apple CVE-2015-3746 : Apple CVE-2015-3747 : Apple CVE-2015-3748 : Apple CVE-2015-3749 : Apple
Web Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a malicious website may lead to user interface spoofing Description: Navigating to a malformed URL may have allowed a malicious website to display an arbitrary URL. This issue was addressed through improved URL handling. CVE-ID CVE-2015-3755 : xisigr of Tencent's Xuanwu Lab
WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious website may exfiltrate image data cross-origin Description: Images fetched through URLs that redirected to a data:image resource could have been exfiltrated cross-origin. This issue was addressed through improved canvas taint tracking. CVE-ID CVE-2015-3753 : Antonio Sanso and Damien Antipa of Adobe
WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious website can trigger plaintext requests to an origin under HTTP Strict Transport Security Description: An issue existed where Content Security Policy report requests would not honor HTTP Strict Transport Security (HSTS). The issue was addressed by applying HSTS to CSP. CVE-ID CVE-2015-3750 : Muneaki Nishimura (nishimunea)
WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious website can make a tap event produce a synthetic click on another page Description: An issue existed in how synthetic clicks are generated from tap events that could cause clicks to target other pages. The issue was addressed through restricted click propagation. CVE-ID CVE-2015-5759 : Phillip Moon and Matt Weston of Sandfield
WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Content Security Policy report requests may leak cookies Description: Two issues existed in how cookies were added to Content Security Policy report requests. Cookies were sent in cross-origin report requests in violation of the standard. Cookies set during regular browsing were sent in private browsing. These issues were addressed through improved cookie handling. CVE-ID CVE-2015-3752 : Muneaki Nishimura (nishimunea)
WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Image loading may violate a website's Content Security Policy directive Description: An issue existed where websites with video controls would load images nested in object elements in violation of the website's Content Security Policy directive. This issue was addressed through improved Content Security Policy enforcement. CVE-ID CVE-2015-3751 : Muneaki Nishimura (nishimunea)
Installation note:
This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/
iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
- Navigate to Settings
- Select General
- Select About. The version after applying this update will be "8.4.1".
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
iQIcBAEBCAAGBQJVzM4DAAoJEBcWfLTuOo7tstIQAKxtjly6AG1Hjo34z4nRSei8 AyZLycwG+oCwcL22lsYOnQgVl2cNDJulsFmJzGWRApHNbfiMDqg/MdlyXzJDB8jg PLJJmR8CIqMKDKxAq/zQ1XJxTLt9579KTOpiTvMpT3ac+En0PDGeftTutzepiIz4 2GAkNmUclWaYygLCfNyQhQNWe7LtoGzxEkjJOa+oAFaNHpx4o1LrZrqkp3w1/mSG ZyHsH6U7UR2QowkXj/h1wNLBX82tc4QkH64VTEeHgl6txWTrQhlubdBc1cVfkw1+ NJh6oJ4xEivXhG//yaBaj0UZ+GyqwhtuiIwxG4YYteQUjuuXEze/WFkLblYCRbiP DzFK93xbPD0jETOYbV6+QS12rIJ+CfeMM1ILmMLsKHpeh5O/WB4oGsN3G8UGCju7 Swh1aEzy1krOFN9qqEtkItEUDMahYnF6W9gQE3Uoo8Gx47qZ/s+1rG9z7yyMtN+O Xg8SULkblnUYGUFoiZItYZNDPbalbPKGUQG8Td3R3cl7O01xRtn0odmvy4baSX8+ 7o15etb0ihnNfpRV7eAk7U8w9L1OdCPaTLk9msQR2v9xBMQzmd4ypsIp2A+MY9e2 fOGRuC/o6dGy7v2yT6t5uqbCKrcJQ2lHJI78hVB8A+3+6bqKZ9jpg/gtTy0Qzolp b/jh8IEOuyI7+KrcrD3U =tJVt -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: libxml2 security update Advisory ID: RHSA-2014:1655-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1655.html Issue date: 2014-10-16 CVE Names: CVE-2014-3660 =====================================================================
- Summary:
Updated libxml2 packages that fix one security issue are now available for Red Hat Enterprise Linux 6 and 7.
Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
The libxml2 library is a development toolbox providing the implementation of various XML standards.
A denial of service flaw was found in libxml2, a library providing support to read, modify and write XML and HTML files. (CVE-2014-3660)
All libxml2 users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. The desktop must be restarted (log out, then log back in) for this update to take effect.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: libxml2-2.7.6-17.el6_6.1.src.rpm
i386: libxml2-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-python-2.7.6-17.el6_6.1.i686.rpm
x86_64: libxml2-2.7.6-17.el6_6.1.i686.rpm libxml2-2.7.6-17.el6_6.1.x86_64.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm libxml2-python-2.7.6-17.el6_6.1.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386: libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-devel-2.7.6-17.el6_6.1.i686.rpm libxml2-static-2.7.6-17.el6_6.1.i686.rpm
x86_64: libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm libxml2-devel-2.7.6-17.el6_6.1.i686.rpm libxml2-devel-2.7.6-17.el6_6.1.x86_64.rpm libxml2-static-2.7.6-17.el6_6.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: libxml2-2.7.6-17.el6_6.1.src.rpm
x86_64: libxml2-2.7.6-17.el6_6.1.i686.rpm libxml2-2.7.6-17.el6_6.1.x86_64.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm libxml2-python-2.7.6-17.el6_6.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64: libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm libxml2-devel-2.7.6-17.el6_6.1.i686.rpm libxml2-devel-2.7.6-17.el6_6.1.x86_64.rpm libxml2-static-2.7.6-17.el6_6.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: libxml2-2.7.6-17.el6_6.1.src.rpm
i386: libxml2-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-devel-2.7.6-17.el6_6.1.i686.rpm libxml2-python-2.7.6-17.el6_6.1.i686.rpm
ppc64: libxml2-2.7.6-17.el6_6.1.ppc.rpm libxml2-2.7.6-17.el6_6.1.ppc64.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.ppc.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.ppc64.rpm libxml2-devel-2.7.6-17.el6_6.1.ppc.rpm libxml2-devel-2.7.6-17.el6_6.1.ppc64.rpm libxml2-python-2.7.6-17.el6_6.1.ppc64.rpm
s390x: libxml2-2.7.6-17.el6_6.1.s390.rpm libxml2-2.7.6-17.el6_6.1.s390x.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.s390.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.s390x.rpm libxml2-devel-2.7.6-17.el6_6.1.s390.rpm libxml2-devel-2.7.6-17.el6_6.1.s390x.rpm libxml2-python-2.7.6-17.el6_6.1.s390x.rpm
x86_64: libxml2-2.7.6-17.el6_6.1.i686.rpm libxml2-2.7.6-17.el6_6.1.x86_64.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm libxml2-devel-2.7.6-17.el6_6.1.i686.rpm libxml2-devel-2.7.6-17.el6_6.1.x86_64.rpm libxml2-python-2.7.6-17.el6_6.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386: libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-static-2.7.6-17.el6_6.1.i686.rpm
ppc64: libxml2-debuginfo-2.7.6-17.el6_6.1.ppc64.rpm libxml2-static-2.7.6-17.el6_6.1.ppc64.rpm
s390x: libxml2-debuginfo-2.7.6-17.el6_6.1.s390x.rpm libxml2-static-2.7.6-17.el6_6.1.s390x.rpm
x86_64: libxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm libxml2-static-2.7.6-17.el6_6.1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: libxml2-2.7.6-17.el6_6.1.src.rpm
i386: libxml2-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-devel-2.7.6-17.el6_6.1.i686.rpm libxml2-python-2.7.6-17.el6_6.1.i686.rpm
x86_64: libxml2-2.7.6-17.el6_6.1.i686.rpm libxml2-2.7.6-17.el6_6.1.x86_64.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm libxml2-devel-2.7.6-17.el6_6.1.i686.rpm libxml2-devel-2.7.6-17.el6_6.1.x86_64.rpm libxml2-python-2.7.6-17.el6_6.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386: libxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm libxml2-static-2.7.6-17.el6_6.1.i686.rpm
x86_64: libxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm libxml2-static-2.7.6-17.el6_6.1.x86_64.rpm
Red Hat Enterprise Linux Client (v. 7):
Source: libxml2-2.9.1-5.el7_0.1.src.rpm
x86_64: libxml2-2.9.1-5.el7_0.1.i686.rpm libxml2-2.9.1-5.el7_0.1.x86_64.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm libxml2-python-2.9.1-5.el7_0.1.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: libxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm libxml2-devel-2.9.1-5.el7_0.1.i686.rpm libxml2-devel-2.9.1-5.el7_0.1.x86_64.rpm libxml2-static-2.9.1-5.el7_0.1.i686.rpm libxml2-static-2.9.1-5.el7_0.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: libxml2-2.9.1-5.el7_0.1.src.rpm
x86_64: libxml2-2.9.1-5.el7_0.1.i686.rpm libxml2-2.9.1-5.el7_0.1.x86_64.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm libxml2-python-2.9.1-5.el7_0.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: libxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm libxml2-devel-2.9.1-5.el7_0.1.i686.rpm libxml2-devel-2.9.1-5.el7_0.1.x86_64.rpm libxml2-static-2.9.1-5.el7_0.1.i686.rpm libxml2-static-2.9.1-5.el7_0.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: libxml2-2.9.1-5.el7_0.1.src.rpm
ppc64: libxml2-2.9.1-5.el7_0.1.ppc.rpm libxml2-2.9.1-5.el7_0.1.ppc64.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.ppc.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.ppc64.rpm libxml2-devel-2.9.1-5.el7_0.1.ppc.rpm libxml2-devel-2.9.1-5.el7_0.1.ppc64.rpm libxml2-python-2.9.1-5.el7_0.1.ppc64.rpm
s390x: libxml2-2.9.1-5.el7_0.1.s390.rpm libxml2-2.9.1-5.el7_0.1.s390x.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.s390.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.s390x.rpm libxml2-devel-2.9.1-5.el7_0.1.s390.rpm libxml2-devel-2.9.1-5.el7_0.1.s390x.rpm libxml2-python-2.9.1-5.el7_0.1.s390x.rpm
x86_64: libxml2-2.9.1-5.el7_0.1.i686.rpm libxml2-2.9.1-5.el7_0.1.x86_64.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm libxml2-devel-2.9.1-5.el7_0.1.i686.rpm libxml2-devel-2.9.1-5.el7_0.1.x86_64.rpm libxml2-python-2.9.1-5.el7_0.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: libxml2-debuginfo-2.9.1-5.el7_0.1.ppc.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.ppc64.rpm libxml2-static-2.9.1-5.el7_0.1.ppc.rpm libxml2-static-2.9.1-5.el7_0.1.ppc64.rpm
s390x: libxml2-debuginfo-2.9.1-5.el7_0.1.s390.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.s390x.rpm libxml2-static-2.9.1-5.el7_0.1.s390.rpm libxml2-static-2.9.1-5.el7_0.1.s390x.rpm
x86_64: libxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm libxml2-static-2.9.1-5.el7_0.1.i686.rpm libxml2-static-2.9.1-5.el7_0.1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: libxml2-2.9.1-5.el7_0.1.src.rpm
x86_64: libxml2-2.9.1-5.el7_0.1.i686.rpm libxml2-2.9.1-5.el7_0.1.x86_64.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm libxml2-devel-2.9.1-5.el7_0.1.i686.rpm libxml2-devel-2.9.1-5.el7_0.1.x86_64.rpm libxml2-python-2.9.1-5.el7_0.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: libxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm libxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm libxml2-static-2.9.1-5.el7_0.1.i686.rpm libxml2-static-2.9.1-5.el7_0.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2014-3660.html https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201411-0450", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "libxml2", "scope": "eq", "trust": 1.9, "vendor": "xmlsoft", "version": "2.6.13" }, { "model": "libxml2", "scope": "eq", "trust": 1.9, "vendor": "xmlsoft", "version": "2.6.0" }, { "model": "libxml2", "scope": "eq", "trust": 1.9, "vendor": "xmlsoft", "version": "2.5.8" }, { "model": "libxml2", "scope": "eq", "trust": 1.9, "vendor": "xmlsoft", "version": "2.5.4" }, { "model": "libxml2", "scope": "eq", "trust": 1.9, "vendor": "xmlsoft", "version": "2.0.0" }, { "model": "libxml2", "scope": "eq", "trust": 1.9, "vendor": "xmlsoft", "version": "2.5.7" }, { "model": "libxml2", "scope": "eq", "trust": 1.9, "vendor": "xmlsoft", "version": "2.6.11" }, { "model": "libxml2", "scope": "eq", "trust": 1.9, "vendor": "xmlsoft", "version": "2.6.12" }, { "model": "libxml2", "scope": "eq", "trust": 1.9, "vendor": "xmlsoft", "version": "2.5.11" }, { "model": "libxml2", "scope": "eq", "trust": 1.9, "vendor": "xmlsoft", "version": "2.6.1" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.3.10" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.6" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.6" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.2.6" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.32" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.1" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.14" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.9" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.1.0" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.25" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.30" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.3.12" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.3.8" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.5.0" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.18" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.2.2" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.28" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.14" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.24" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.2.4" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.3.6" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.16" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.29" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.7.2" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.7" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.9.0" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.3" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.2.10" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.3.14" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.21" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.2.7" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.25" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.2.3" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.28" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.3.5" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.8" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.26" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.10" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.3.4" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.26" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.18" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.7.6" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.17" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.22" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.3.0" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.5.10" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.13" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.2.8" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.7.4" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.9" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.20" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.21" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.2.5" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.2" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.3" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.30" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.23" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.2.1" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.29" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.22" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.11" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.7.8" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.31" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.27" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.7.1" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.27" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.4" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.7.3" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.3.3" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.19" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.7.5" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.24" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.2.9" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.2.0" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.23" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.8" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.5" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.3.11" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.16" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.20" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.3.1" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.2" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.4" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.15" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.3.13" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.12" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.5" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.3.2" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.6.17" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.4.7" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.3.7" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.7.7" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.2.11" }, { "model": "libxml2", "scope": "eq", "trust": 1.3, "vendor": "xmlsoft", "version": "2.1.1" }, { "model": "mac os x", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.10.4" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.0" }, { "model": "libxml2", "scope": "lte", "trust": 1.0, "vendor": "xmlsoft", "version": "2.9.1" }, { "model": "libxml2", "scope": "eq", "trust": 1.0, "vendor": "xmlsoft", "version": "2.7.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "libxml2", "scope": "eq", "trust": 1.0, "vendor": "xmlsoft", "version": "2.3.9" }, { "model": "libxml2", "scope": "eq", "trust": 1.0, "vendor": "xmlsoft", "version": "2.8.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "10.04" }, { "model": "libxml2", "scope": "lt", "trust": 0.8, "vendor": "xmlsoft", "version": "2.9.2" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.10 to 10.10.4" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.9.5" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "8.4.1 (ipad 2 or later )" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "8.4.1 (iphone 4s or later )" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "8.4.1 (ipod touch first 5 after generation )" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "10" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "11.2" }, { "model": "system networking rackswitch g8316", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.11.0" }, { "model": "aura collaboration environment", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "flex system en2092 1gb ethernet scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.60" }, { "model": "system networking rackswitch g8332", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.13.0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "31005.1" }, { "model": "bladecenter advanced management module 25r5778", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "bladecenter -s", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1948" }, { "model": "system networking rackswitch g8264-t", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.13.0" }, { "model": "system networking rackswitch g8124-e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.11.0" }, { "model": "system m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x355042540" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.0" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.2" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.4" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.1.3" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.3" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.10" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "8.4.1" }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "system networking rackswitch g8332", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.18.0" }, { "model": "system m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x355041980" }, { "model": "system networking rackswitch g8316", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.100" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.2.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.3" }, { "model": "system networking rackswitch g8124-e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.100" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.1" }, { "model": "aura system platform sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1" }, { "model": "flex system fabric cn4093 10gb converged scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.60" }, { "model": "flex system fabric en4093r 10gb scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.6.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.0" }, { "model": "system networking rackswitch g8264cs", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.60" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "31005.1.2" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.1" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1" }, { "model": "system networking rackswitch g8332", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.170" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1.1" }, { "model": "bladecenter -t", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8720" }, { "model": "meeting exchange sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0.0.52" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.1" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "71005.1.1" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.0.3" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "libxml2", "scope": "eq", "trust": 0.3, "vendor": "xmlsoft", "version": "2.9" }, { "model": "system m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x365079450" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "bladecenter -s", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8886" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.7" }, { "model": "system networking rackswitch g8124", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.11.0" }, { "model": "aura communication manager ssp04", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.1" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "71005.1.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.2" }, { "model": "flex system fabric cn4093 10gb converged scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.5.1.0" }, { "model": "vm server for", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "x863.3" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "aura application server sip core pb23", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.1" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.2" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.0" }, { "model": "flex system fabric cn4093 10gb converged scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.8.0" }, { "model": "bladecenter -e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7967" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.0.2" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.1" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "31005.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "virtual fabric 10gb switch module for ibm bladecenter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.5.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.1" }, { "model": "flex system fabric en4093r 10gb scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.9" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "41005.3" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.6" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8" }, { "model": "bladecenter -h", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8852" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.10.5" }, { "model": "bladecenter -ht", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8750" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "system networking rackswitch g8124", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.100" }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.0" }, { "model": "system m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x365042550" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "system networking rackswitch g8316", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.6.1.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.3" }, { "model": "system networking rackswitch g8264-t", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.11.0" }, { "model": "esxi esxi550-20150110", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.3" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "71005.2" }, { "model": "flex system en2092 1gb ethernet scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.7" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.2" }, { "model": "meeting exchange sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1" }, { "model": "flex system fabric en4093 10gb scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.4.0" }, { "model": "aura communication manager utility services sp", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.16.1.0.9.8" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.8" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3690x571480" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.6" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.5" }, { "model": "flex system en2092 1gb ethernet scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.10.0" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.4" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1" }, { "model": "system m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x350073800" }, { "model": "bladecenter -e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1881" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.4.0.15" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.4" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.5" }, { "model": "flex system fabric si4093 system interconnect module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.4.0" }, { "model": "system networking rackswitch g8264-t", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.100" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "flex system fabric en4093 10gb scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "system idataplex dx360 m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x63910" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.6" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "cms r17", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7" }, { "model": "aura utility services sp7", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.4" }, { "model": "aura application server sip core pb28", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.2" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "41005.1.1" }, { "model": "meeting exchange sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "libxml2", "scope": "eq", "trust": 0.3, "vendor": "xmlsoft", "version": "2.5.1" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "41005.1.21" }, { "model": "bladecenter -s", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7779" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.1" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.4.2" }, { "model": "flex system en2092 1gb ethernet scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.4.0" }, { "model": "tv", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "7.2.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3690x571470" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "51005.2" }, { "model": "system networking rackswitch g8332", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.19.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "51005.1.1" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.0.1" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.5.0.15" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "system m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x365041990" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.0" }, { "model": "flex system fabric cn4093 10gb converged scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.10.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura system manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.20" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.3" }, { "model": "flex system en2092 1gb ethernet scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.5" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "41005.1.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.3" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3950x571430" }, { "model": "system idataplex dx360 m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x73210" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.2" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "libxml2", "scope": "eq", "trust": 0.3, "vendor": "xmlsoft", "version": "2.7" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "system idataplex dx360 m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x63800" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "51005.1.21" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.8.3" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.1" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "71005.1.21" }, { "model": "integrated management module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.47" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "71005.3" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.6" }, { "model": "flex system fabric cn4093 10gb converged scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.4.0" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.3.9.3" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.2.1" }, { "model": "system networking rackswitch g8264cs", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.4.0" }, { "model": "aura application server sip core pb19", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "meeting exchange", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "system networking rackswitch g8264", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.1.0" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1x8664" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.0" }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "aura collaboration environment", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "system networking rackswitch g8052", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.11.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.1" }, { "model": "system networking rackswitch g8264-t", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.6.1.0" }, { "model": "system networking rackswitch g8264cs", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "41005.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.1" }, { "model": "system m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x355079460" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.7" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aura conferencing", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.2" }, { "model": "system m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x355079440" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1.3" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3690x571920" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.1" }, { "model": "bladecenter advanced management module 3.66n", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "system m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x365079470" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "51005.3" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3690x571490" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3850x571430" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "aura application server sip core pb3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.3.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.4" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.2" }, { "model": "system networking rackswitch g8052", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.100" }, { "model": "aura application server sip core pb26", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.04" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.0.2" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.1" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "bladecenter t advanced management module 32r0835", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "flex system fabric en4093r 10gb scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.10.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.1.1" }, { "model": "flex system fabric en4093 10gb scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.6.0" }, { "model": "integrated management module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.00" }, { "model": "aura presence services sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "system networking rackswitch g8264", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.8.2.0" }, { "model": "aura presence services sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.3" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.0" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "ipad", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1.2" }, { "model": "bladecenter -t", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8730" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.2" }, { "model": "libxml2 rc1", "scope": "eq", "trust": 0.3, "vendor": "xmlsoft", "version": "2.9" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.4" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1.6" }, { "model": "bladecenter advanced management module 3.66k", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "system networking rackswitch g8316", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.13.0" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.5" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "31005.1.21" }, { "model": "bladecenter -h", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7989" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.3" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "31005.3" }, { "model": "flex system fabric si4093 system interconnect module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.8.0" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.10" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.2" }, { "model": "bladecenter -ht", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8740" }, { "model": "system networking rackswitch g8124-e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.13.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1.0" }, { "model": "aura application server sip core pb5", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "31005.1.1" }, { "model": "flex system fabric en4093r 10gb scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.4.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.8" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "libxml2", "scope": "eq", "trust": 0.3, "vendor": "xmlsoft", "version": "2.6.15" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "libxml2", "scope": "eq", "trust": 0.3, "vendor": "xmlsoft", "version": "2.9.1" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "5" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.1" }, { "model": "vm server for", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "x863.4" }, { "model": "virtual fabric 10gb switch module for ibm bladecenter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0.1.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.4" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "system idataplex dx360 m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x73230" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.1.2" }, { "model": "system networking rackswitch g8264", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.11.0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "41005.2" }, { "model": "flex system fabric en4093 10gb scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.9" }, { "model": "system m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x363073770" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "flex system fabric en4093r 10gb scalable switch", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2.1.0.9" }, { "model": "system networking rackswitch g8124-e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.3.0" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53003.0" }, { "model": "aura application server sip core pb25", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.5" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.3" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1" }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "aura system manager sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "system networking rackswitch g8264", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.13.0" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3950x57145" }, { "model": "bladecenter -h", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1886" }, { "model": "aura system platform sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "system networking rackswitch g8052", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.8" }, { "model": "aura conferencing", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "71005.1" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.2" }, { "model": "libxml2", "scope": "ne", "trust": 0.3, "vendor": "xmlsoft", "version": "2.9.2" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aura system platform sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aura utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "system networking rackswitch g8264", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.100" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3850x571910" }, { "model": "system networking rackswitch g8264", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.9.12.0" }, { "model": "bladecenter -e", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8677" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.9" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "51005.1.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1.4" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "51005.1" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "system m3 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x365054540" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "aura utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.0.9.8" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "system networking rackswitch g8264cs", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.8.0" }, { "model": "aura application server sip core pb16", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "system m2 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x350078390" }, { "model": "libxml2 beta", "scope": "eq", "trust": 0.3, "vendor": "xmlsoft", "version": "2.2" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3850x571450" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.3.0" }, { "model": "flex system fabric si4093 system interconnect module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.60" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "flex system fabric si4093 system interconnect module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.5.0" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3850x571460" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "tv", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0" }, { "model": "flex system fabric si4093 system interconnect module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.8.10.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.7" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.4" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.1" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.2" }, { "model": "vm server for", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "x863.2" }, { "model": "system networking rackswitch g8124", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.3.0" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" } ], "sources": [ { "db": "BID", "id": "70644" }, { "db": "JVNDB", "id": "JVNDB-2014-005228" }, { "db": "CNNVD", "id": "CNNVD-201410-1338" }, { "db": "NVD", "id": "CVE-2014-3660" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.9.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.9.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.10.4", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-3660" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Netherlands Cyber Security Center", "sources": [ { "db": "BID", "id": "70644" }, { "db": "CNNVD", "id": "CNNVD-201410-1338" } ], "trust": 0.9 }, "cve": "CVE-2014-3660", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2014-3660", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-71600", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-3660", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201410-1338", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-71600", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2014-3660", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-71600" }, { "db": "VULMON", "id": "CVE-2014-3660" }, { "db": "JVNDB", "id": "JVNDB-2014-005228" }, { "db": "CNNVD", "id": "CNNVD-201410-1338" }, { "db": "NVD", "id": "CVE-2014-3660" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the \"billion laughs\" attack. This vulnerability Billion Laughs Vulnerability that has been mutated from the attack. Supplementary information : CWE Vulnerability type by CWE-611: Improper Restriction of XML External Entity Reference (\u0027XXE\u0027) (XML Inappropriate restrictions on external entity references ) Has been identified. Libxml2 is prone to a denial-of-service vulnerability. \nSuccessful exploit will allow attackers to consume large amounts of memory and cause a crash through a specially crafted XML containing malicious attributes. It supports multiple encoding formats, XPath analysis, Well-formed and valid verification, etc. \n\nBackground\n==========\n\nlibxml2 is the XML C parser and toolkit developed for the Gnome\nproject. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll libxml2 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-libs/libxml2-2.9.2\"\n\nPackages which depend on this library may need to be recompiled. Tools\nsuch as revdep-rebuild may assist in identifying these packages. \n\nReferences\n==========\n\n[ 1 ] CVE-2014-3660\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3660\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201412-06.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. ============================================================================\nUbuntu Security Notice USN-2389-1\nOctober 27, 2014\n\nlibxml2 vulnerability\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n- Ubuntu 10.04 LTS\n\nSummary:\n\nlibxml2 could be made to consume resources if it processed a specially\ncrafted file. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n libxml2 2.9.1+dfsg1-3ubuntu4.4\n\nUbuntu 12.04 LTS:\n libxml2 2.7.8.dfsg-5.1ubuntu4.11\n\nUbuntu 10.04 LTS:\n libxml2 2.7.6.dfsg-1ubuntu1.15\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. The verification\n of md5 checksums and GPG signatures is performed automatically for you. Summary\n\n VMware vCenter Server, ESXi, Workstation, Player and Fusion address\n several security issues. Relevant Releases\n\n VMware Workstation 10.x prior to version 10.0.5\n \n VMware Player 6.x prior to version 6.0.5\n\n VMware Fusion 7.x prior to version 7.0.1\n VMware Fusion 6.x prior to version 6.0.5\n\n vCenter Server 5.5 prior to Update 2d\n\n ESXi 5.5 without patch ESXi550-201403102-SG, ESXi550-201501101-SG\n ESXi 5.1 without patch ESXi510-201404101-SG\n ESXi 5.0 without patch ESXi500-201405101-SG\n\n3. Problem Description \n\n a. VMware ESXi, Workstation, Player, and Fusion host privilege\n escalation vulnerability\n\n VMware ESXi, Workstation, Player and Fusion contain an arbitrary \n file write issue. Exploitation this issue may allow for privilege\n escalation on the host. \n\n The vulnerability does not allow for privilege escalation from \n the guest Operating System to the host or vice-versa. This means\n that host memory can not be manipulated from the Guest Operating\n System. \n\n Mitigation\n \n For ESXi to be affected, permissions must have been added to ESXi\n (or a vCenter Server managing it) for a virtual machine \n administrator role or greater. \n\n VMware would like to thank Shanon Olsson for reporting this issue to\n us through JPCERT. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the identifier CVE-2014-8370 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is \n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n Workstation 11.x any not affected\n Workstation 10.x any 10.0.5\n\n Player 7.x any not affected\n Player 6.x any 6.0.5\n\n Fusion 7.x any not affected\n Fusion 6.x any 6.0.5\n\n ESXi 5.5 ESXi ESXi550-201403102-SG\n ESXi 5.1 ESXi ESXi510-201404101-SG \n ESXi 5.0 ESXi ESXi500-201405101-SG\n\n b. VMware Workstation, Player, and Fusion Denial of Service \n vulnerability\n\n VMware Workstation, Player, and Fusion contain an input validation \n issue in the Host Guest File System (HGFS). This issue may allow\n for a Denial of Service of the Guest Operating system. \n\n VMware would like to thank Peter Kamensky from Digital Security for \n reporting this issue to us. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the identifier CVE-2015-1043 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is \n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n Workstation 11.x any not affected\n Workstation 10.x any 10.0.5\n\n Player 7.x any not affected\n Player 6.x any 6.0.5\n\n Fusion 7.x any 7.0.1\n Fusion 6.x any 6.0.5\n\n c. VMware ESXi, Workstation, and Player Denial of Service \n vulnerability\n\n VMware ESXi, Workstation, and Player contain an input\n validation issue in VMware Authorization process (vmware-authd). \n This issue may allow for a Denial of Service of the host. On \n VMware ESXi and on Workstation running on Linux the Denial of\n Service would be partial. \n\n VMware would like to thank Dmitry Yudin @ret5et for reporting\n this issue to us through HP\u0027s Zero Day Initiative. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the identifier CVE-2015-1044 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is \n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n Workstation 11.x any not affected\n Workstation 10.x any 10.0.5\n\n Player 7.x any not affected\n Player 6.x any 6.0.5\n\n Fusion 7.x any not affected\n Fusion 6.x any not affected\n\n ESXi 5.5 ESXi ESXi550-201501101-SG\n ESXi 5.1 ESXi ESXi510-201410101-SG\n ESXi 5.0 ESXi not affected\n\n d. Update to VMware vCenter Server and ESXi for OpenSSL 1.0.1 \n and 0.9.8 package\n\n The OpenSSL library is updated to version 1.0.1j or 0.9.8zc\n to resolve multiple security issues. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the names CVE-2014-3513, CVE-2014-3567, \n CVE-2014-3566 (\"POODLE\") and CVE-2014-3568 to these issues. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n vCenter Server 5.5 any Update 2d*\n vCenter Server 5.1 any patch pending\n vCenter Server 5.0 any patch pending\n\n ESXi 5.5 ESXi ESXi550-201501101-SG \n ESXi 5.1 ESXi patch pending\n ESXi 5.0 ESXi patch pending\n\n * The VMware vCenter 5.5 SSO component will be \n updated in a later release\n \n e. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the name CVE-2014-3660 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n ESXi 5.5 ESXi ESXi550-201501101-SG \n ESXi 5.1 ESXi patch pending\n ESXi 5.0 ESXi patch pending\n \n4. Solution\n\n Please review the patch/release notes for your product and \n version and verify the checksum of your downloaded file. \n\n VMware Workstation 10.x\n -------------------------------- \n https://www.vmware.com/go/downloadworkstation \n\n VMware Player 6.x\n -------------------------------- \n https://www.vmware.com/go/downloadplayer \n\n VMware Fusion 7.x and 6.x\n -------------------------------- \n https://www.vmware.com/go/downloadplayer \n\n vCenter Server\n ----------------------------\n Downloads and Documentation: \n https://www.vmware.com/go/download-vsphere \n\n ESXi 5.5 Update 2d\n ----------------------------\n File: update-from-esxi5.5-5.5_update01.zip\n md5sum: 5773844efc7d8e43135de46801d6ea25\n sha1sum: 6518355d260e81b562c66c5016781db9f077161f\n http://kb.vmware.com/kb/2065832\n update-from-esxi5.5-5.5_update01 contains ESXi550-201403102-SG\n\n ESXi 5.5\n ----------------------------\n File: ESXi550-201501001.zip\n md5sum: b0f2edd9ad17d0bae5a11782aaef9304\n sha1sum: 9cfcb1e2cf1bb845f0c96c5472d6b3a66f025dd1\n http://kb.vmware.com/kb/2099265\n ESXi550-201501001.zip contains ESXi550-201501101-SG\n\n ESXi 5.1\n ----------------------------\n File: ESXi510-201404001.zip\n md5sum: 9dc3c9538de4451244a2b62d247e52c4\n sha1sum: 6b1ea36a2711665a670afc9ae37cdd616bb6da66\n http://kb.vmware.com/kb/2070666\n ESXi510-201404001 contains ESXi510-201404101-SG\n\n ESXi 5.0\n ----------------------------\n File: ESXi500-201405001.zip\n md5sum: 7cd1afc97f5f1e4b4132c90835f92e1d\n sha1sum: 4bd77eeb5d7fc65bbb6f25762b0fa74fbb9679d5\n http://kb.vmware.com/kb/2075521\n ESXi500-201405001 contains ESXi500-201405101-SG\n \n5. Change log\n\n 2015-01-27 VMSA-2015-0001\n Initial security advisory in conjunction with the release of VMware\n Workstation 10.0.5, VMware Player 6.0.5, vCenter Server 5.5 Update 2d\n and, ESXi 5.5 Patches released on 2015-01-27. Contact\n\n E-mail list for product security notifications and announcements:\n http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\n This Security Advisory is posted to the following lists:\n\n security-announce at lists.vmware.com\n bugtraq at securityfocus.com\n fulldisclosure at seclists.org\n\n E-mail: security at vmware.com\n PGP key at: http://kb.vmware.com/kb/1055\n\n VMware Security Advisories\n http://www.vmware.com/security/advisories\n\n Consolidated list of VMware Security Advisories\n http://kb.vmware.com/kb/2078735\n\n VMware Security Response Policy\n https://www.vmware.com/support/policies/security_response.html\n\n VMware Lifecycle Support Phases\n https://www.vmware.com/support/policies/lifecycle.html\n \n Twitter\n https://twitter.com/VMwareSRC\n\n Copyright 2015 VMware Inc. All rights reserved. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2015-08-13-3 iOS 8.4.1\n\niOS 8.4.1 is now available and addresses the following:\n\nAppleFileConduit\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A maliciously crafted afc command may allow access to\nprotected parts of the filesystem\nDescription: An issue existed in the symbolic linking mechanism of\nafc. This issue was addressed by adding additional path checks. \nCVE-ID\nCVE-2015-5746 : evad3rs, TaiG Jailbreak Team\n\nAir Traffic\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: AirTraffic may have allowed access to protected parts of the\nfilesystem\nDescription: A path traversal issue existed in asset handling. This\nwas addressed with improved validation. \nCVE-ID\nCVE-2015-5766 : TaiG Jailbreak Team\n\nBackup\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A malicious application may be able to create symlinks to\nprotected regions of the disk\nDescription: An issue existed within the path validation logic for\nsymlinks. This issue was addressed through improved path\nsanitization. \nCVE-ID\nCVE-2015-5752 : TaiG Jailbreak Team\n\nbootp\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A malicious Wi-Fi network may be able to determine networks\na device has previously accessed\nDescription: Upon connecting to a Wi-Fi network, iOS may have\nbroadcast MAC addresses of previously accessed networks via the DNAv4\nprotocol. This issue was addressed through disabling DNAv4 on\nunencrypted Wi-Fi networks. \nCVE-ID\nCVE-2015-3778 : Piers O\u0027Hanlon of Oxford Internet Institute,\nUniversity of Oxford (on the EPSRC Being There project)\n\nCertificate UI\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: An attacker with a privileged network position may be able\nto accept untrusted certificates from the lock screen\nDescription: Under certain circumstances, the device may have\npresented a certificate trust dialog while in a locked state. This\nissue was addressed through improved state management. \nCVE-ID\nCVE-2015-3756 : Andy Grant of NCC Group\n\nCloudKit\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A malicious application may be able to access the iCloud\nuser record of a previously signed in user\nDescription: A state inconsistency existed in CloudKit when signing\nout users. This issue was addressed through improved state handling. \nCVE-ID\nCVE-2015-3782 : Deepkanwal Plaha of University of Toronto\n\nCFPreferences\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A malicious app may be able to read other apps\u0027 managed\npreferences\nDescription: An issue existed in the third-party app sandbox. This\nissue was addressed by improving the third-party sandbox profile. \nCVE-ID\nCVE-2015-3793 : Andreas Weinlein of the Appthority Mobility Threat\nTeam\n\nCode Signing\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A malicious application may be able to execute unsigned code\nDescription: An issue existed that allowed unsigned code to be\nappended to signed code in a specially crafted executable file. This\nissue was addressed through improved code signature validation. \nCVE-ID\nCVE-2015-3806 : TaiG Jailbreak Team\n\nCode Signing\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A specially crafted executable file could allow unsigned,\nmalicious code to execute\nDescription: An issue existed in the way multi-architecture\nexecutable files were evaluated that could have allowed unsigned code\nto be executed. This issue was addressed through improved validation\nof executable files. \nCVE-ID\nCVE-2015-3803 : TaiG Jailbreak Team\n\nCode Signing\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A local user may be able to execute unsigned code\nDescription: A validation issue existed in the handling of Mach-O\nfiles. This was addressed by adding additional checks. \nCVE-ID\nCVE-2015-3802 : TaiG Jailbreak Team\nCVE-2015-3805 : TaiG Jailbreak Team\n\nCoreMedia Playback\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in CoreMedia\nPlayback. This issue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-5777 : Apple\nCVE-2015-5778 : Apple\n\nCoreText\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Processing a maliciously crafted font file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in the processing of\nfont files. This issue was addressed through improved input\nvalidation. \nCVE-ID\nCVE-2015-5755 : John Villamil (@day6reak), Yahoo Pentest Team\nCVE-2015-5761 : John Villamil (@day6reak), Yahoo Pentest Team\n\nDiskImages\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Processing a maliciously crafted DMG file may lead to an\nunexpected application termination or arbitrary code execution with\nsystem privileges\nDescription: A memory corruption issue existed in parsing of\nmalformed DMG images. This issue was addressed through improved\nmemory handling. \nCVE-ID\nCVE-2015-3800 : Frank Graziano of the Yahoo Pentest Team\n\nFontParser\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Processing a maliciously crafted font file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in the processing of\nfont files. This issue was addressed through improved input\nvalidation. \nCVE-ID\nCVE-2015-3804 : Apple\nCVE-2015-5756 : John Villamil (@day6reak), Yahoo Pentest Team\nCVE-2015-5775 : Apple\n\nImageIO\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Processing a maliciously crafted .tiff file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in the processing of\n.tiff files. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2015-5758 : Apple\n\nImageIO\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Visiting a maliciously crafted website may result in the\ndisclosure of process memory\nDescription: An uninitialized memory access issue existed in\nImageIO\u0027s handling of PNG images. Visiting a malicious website may\nresult in sending data from process memory to the website. This issue\nwas addressed through improved memory initialization and additional\nvalidation of PNG images. \nCVE-ID\nCVE-2015-5781 : Michal Zalewski\n\nImageIO\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Visiting a maliciously crafted website may result in the\ndisclosure of process memory\nDescription: An uninitialized memory access issue existed in\nImageIO\u0027s handling of TIFF images. Visiting a malicious website may\nresult in sending data from process memory to the website. This issue\nis addressed through improved memory initialization and additional\nvalidation of TIFF images. \nCVE-ID\nCVE-2015-5782 : Michal Zalewski\n\nIOKit\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Parsing a maliciously crafted plist may lead to an\nunexpected application termination or arbitrary code execution with\nsystem privileges\nDescription: A memory corruption existed in processing of malformed\nplists. This issue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-3776 : Teddy Reed of Facebook Security, Patrick Stein\n(@jollyjinx) of Jinx Germany\n\nIOHIDFamily\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: A buffer overflow issue existed in IOHIDFamily. This\nissue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-5774 : TaiG Jailbreak Team\n\nKernel\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A malicious application may be able to determine kernel\nmemory layout\nDescription: An issue existed in the mach_port_space_info interface,\nwhich could have led to the disclosure of kernel memory layout. This\nwas addressed by disabling the mach_port_space_info interface. \nCVE-ID\nCVE-2015-3766 : Cererdlong of Alibaba Mobile Security Team,\n@PanguTeam\n\nKernel\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: An integer overflow existed in the handling of IOKit\nfunctions. This issue was addressed through improved validation of\nIOKit API arguments. \nCVE-ID\nCVE-2015-3768 : Ilja van Sprundel\n\nLibc\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Processing a maliciously crafted regular expression may lead\nto an unexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in the TRE library. \nThis issue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-3796 : Ian Beer of Google Project Zero\nCVE-2015-3797 : Ian Beer of Google Project Zero\nCVE-2015-3798 : Ian Beer of Google Project Zero\n\nLibinfo\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A remote attacker may be able to cause unexpected\napplication termination or arbitrary code execution\nDescription: A memory corruption issue existed in handling AF_INET6\nsockets. This issue was addressed by improved memory handling. \nCVE-ID\nCVE-2015-5776 : Apple\n\nlibpthread\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: A memory corruption issue existed in handling syscalls. \nThis issue was addressed through improved lock state checking. \nCVE-ID\nCVE-2015-5757 : Lufeng Li of Qihoo 360\n\nlibxml2\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Parsing a maliciously crafted XML document may lead to\ndisclosure of user information\nDescription: A memory corruption issue existed in parsing of XML\nfiles. This issue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-3807 : Michal Zalewski\n\nlibxml2\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Multiple vulnerabilities existed in libxml2 versions prior\nto 2.9.2, the most serious of which may allow a remote attacker to\ncause a denial of service\nDescription: Multiple vulnerabilities existed in libxml2 versions\nprior to 2.9.2. These were addressed by updating libxml2 to version\n2.9.2. \nCVE-ID\nCVE-2012-6685 : Felix Groebert of Google\nCVE-2014-0191 : Felix Groebert of Google\nCVE-2014-3660 : Felix Groebert of Google\n\nlibxpc\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: A memory corruption issue existed in handling of\nmalformed XPC messages. This issue was improved through improved\nbounds checking. \nCVE-ID\nCVE-2015-3795 : Mathew Rowley\n\nLocation Framework\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A local user may be able to modify protected parts of the\nfilesystem\nDescription: A symbolic link issue was addressed through improved\npath validation. \nCVE-ID\nCVE-2015-3759 : Cererdlong of Alibaba Mobile Security Team\n\nMobileInstallation\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A malicious enterprise application may be able to replace\nextensions for other apps\nDescription: An issue existed in the install logic for universal\nprovisioning profile apps, which allowed a collision to occur with\nexisting bundle IDs. This issue was addressed through improved bundle\nID validation. \nCVE-ID\nCVE-2015-5770 : FireEye\n\nMSVDX Driver\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Viewing a malicious video may lead to a unexpected system\ntermination\nDescription: A denial of service issue was addressed through\nimproved memory handling. \nCVE-ID\nCVE-2015-5769 : Proteas of Qihoo 360 Nirvan Team\n\nOffice Viewer\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Parsing a maliciously crafted XML file may lead to\ndisclosure of user information\nDescription: An external entity reference issue existed in XML file\nparsing. This issue was addressed through improved parsing. \nCVE-ID\nCVE-2015-3784 : Bruno Morisson of INTEGRITY S.A. \n\nQL Office\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Parsing a maliciously crafted office document may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in parsing of office\ndocuments. This issue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-5773 : Apple\n\nSafari\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Visiting a malicious website may lead to user interface\nspoofing\nDescription: A malicious website could open another site and prompt\nfor user input without a way for the user to tell where the prompt\noriginated. The issue was addressed by displaying the prompt\u0027s origin\nto the user. \nCVE-ID\nCVE-2015-3729 : Code Audit Labs of VulnHunt.com\n\nSafari\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A malicious website may trigger an infinite number of alert\nmessages\nDescription: An issue existed where a malicious or hacked website\ncould show infinite alert messages and make users believe their\nbrowser was locked. The issue was addressed through throttling of\nJavaScript alerts. \nCVE-ID\nCVE-2015-3763\n\nSandbox_profiles\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: An malicious app may be able to read other apps\u0027 managed\npreferences\nDescription: An issue existed in the third-party app sandbox. This\nissue was addressed by improving the third-party sandbox profile. \nCVE-ID\nCVE-2015-5749 : Andreas Weinlein of the Appthority Mobility Threat\nTeam\n\nUIKit WebView\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A malicious application may be able to initiate FaceTime\ncalls without user authorization\nDescription: An issue existed in the parsing of FaceTime URLs within\nWebViews. This issue was addressed through improved URL validation. \nCVE-ID\nCVE-2015-3758 : Brian Simmons of Salesforce, Guillaume Ross\n\nWebKit\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Visiting a maliciously crafted website may lead to an\nunexpected application termination or arbitrary code execution\nDescription: Multiple memory corruption issues existed in WebKit. \nThese issues were addressed through improved memory handling. \nCVE-ID\nCVE-2015-3730 : Apple\nCVE-2015-3731 : Apple\nCVE-2015-3732 : Apple\nCVE-2015-3733 : Apple\nCVE-2015-3734 : Apple\nCVE-2015-3735 : Apple\nCVE-2015-3736 : Apple\nCVE-2015-3737 : Apple\nCVE-2015-3738 : Apple\nCVE-2015-3739 : Apple\nCVE-2015-3740 : Apple\nCVE-2015-3741 : Apple\nCVE-2015-3742 : Apple\nCVE-2015-3743 : Apple\nCVE-2015-3744 : Apple\nCVE-2015-3745 : Apple\nCVE-2015-3746 : Apple\nCVE-2015-3747 : Apple\nCVE-2015-3748 : Apple\nCVE-2015-3749 : Apple\n\nWeb\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Visiting a malicious website may lead to user interface\nspoofing\nDescription: Navigating to a malformed URL may have allowed a\nmalicious website to display an arbitrary URL. This issue was\naddressed through improved URL handling. \nCVE-ID\nCVE-2015-3755 : xisigr of Tencent\u0027s Xuanwu Lab\n\nWebKit\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A malicious website may exfiltrate image data cross-origin\nDescription: Images fetched through URLs that redirected to a\ndata:image resource could have been exfiltrated cross-origin. This\nissue was addressed through improved canvas taint tracking. \nCVE-ID\nCVE-2015-3753 : Antonio Sanso and Damien Antipa of Adobe\n\nWebKit\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A malicious website can trigger plaintext requests to an\norigin under HTTP Strict Transport Security\nDescription: An issue existed where Content Security Policy report\nrequests would not honor HTTP Strict Transport Security (HSTS). The\nissue was addressed by applying HSTS to CSP. \nCVE-ID\nCVE-2015-3750 : Muneaki Nishimura (nishimunea)\n\nWebKit\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: A malicious website can make a tap event produce a synthetic\nclick on another page\nDescription: An issue existed in how synthetic clicks are generated\nfrom tap events that could cause clicks to target other pages. The\nissue was addressed through restricted click propagation. \nCVE-ID\nCVE-2015-5759 : Phillip Moon and Matt Weston of Sandfield\n\nWebKit\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Content Security Policy report requests may leak cookies\nDescription: Two issues existed in how cookies were added to Content\nSecurity Policy report requests. Cookies were sent in cross-origin\nreport requests in violation of the standard. Cookies set during\nregular browsing were sent in private browsing. These issues were\naddressed through improved cookie handling. \nCVE-ID\nCVE-2015-3752 : Muneaki Nishimura (nishimunea)\n\nWebKit\nAvailable for: iPhone 4s and later,\niPod touch (5th generation) and later, iPad 2 and later\nImpact: Image loading may violate a website\u0027s Content Security\nPolicy directive\nDescription: An issue existed where websites with video controls\nwould load images nested in object elements in violation of the\nwebsite\u0027s Content Security Policy directive. This issue was addressed\nthrough improved Content Security Policy enforcement. \nCVE-ID\nCVE-2015-3751 : Muneaki Nishimura (nishimunea)\n\n\nInstallation note:\n\nThis update is available through iTunes and Software Update on your\niOS device, and will not appear in your computer\u0027s Software Update\napplication, or in the Apple Downloads site. Make sure you have an\nInternet connection and have installed the latest version of iTunes\nfrom www.apple.com/itunes/\n\niTunes and Software Update on the device will automatically check\nApple\u0027s update server on its weekly schedule. When an update is\ndetected, it is downloaded and the option to be installed is\npresented to the user when the iOS device is docked. We recommend\napplying the update immediately if possible. Selecting Don\u0027t Install\nwill present the option the next time you connect your iOS device. \n\nThe automatic update process may take up to a week depending on the\nday that iTunes or the device checks for updates. You may manually\nobtain the update via the Check for Updates button within iTunes, or\nthe Software Update on your device. \n\nTo check that the iPhone, iPod touch, or iPad has been updated:\n\n* Navigate to Settings\n* Select General\n* Select About. The version after applying this update\nwill be \"8.4.1\". \n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\n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\nb/jh8IEOuyI7+KrcrD3U\n=tJVt\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: libxml2 security update\nAdvisory ID: RHSA-2014:1655-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2014-1655.html\nIssue date: 2014-10-16\nCVE Names: CVE-2014-3660 \n=====================================================================\n\n1. Summary:\n\nUpdated libxml2 packages that fix one security issue are now available for\nRed Hat Enterprise Linux 6 and 7. \n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nThe libxml2 library is a development toolbox providing the implementation\nof various XML standards. \n\nA denial of service flaw was found in libxml2, a library providing support\nto read, modify and write XML and HTML files. (CVE-2014-3660)\n\nAll libxml2 users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. The desktop must be\nrestarted (log out, then log back in) for this update to take effect. \n\n4. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\n5. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nlibxml2-2.7.6-17.el6_6.1.src.rpm\n\ni386:\nlibxml2-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-python-2.7.6-17.el6_6.1.i686.rpm\n\nx86_64:\nlibxml2-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-2.7.6-17.el6_6.1.x86_64.rpm\nlibxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm\nlibxml2-python-2.7.6-17.el6_6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nlibxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-devel-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-static-2.7.6-17.el6_6.1.i686.rpm\n\nx86_64:\nlibxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm\nlibxml2-devel-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-devel-2.7.6-17.el6_6.1.x86_64.rpm\nlibxml2-static-2.7.6-17.el6_6.1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nlibxml2-2.7.6-17.el6_6.1.src.rpm\n\nx86_64:\nlibxml2-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-2.7.6-17.el6_6.1.x86_64.rpm\nlibxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm\nlibxml2-python-2.7.6-17.el6_6.1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nlibxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm\nlibxml2-devel-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-devel-2.7.6-17.el6_6.1.x86_64.rpm\nlibxml2-static-2.7.6-17.el6_6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nlibxml2-2.7.6-17.el6_6.1.src.rpm\n\ni386:\nlibxml2-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-devel-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-python-2.7.6-17.el6_6.1.i686.rpm\n\nppc64:\nlibxml2-2.7.6-17.el6_6.1.ppc.rpm\nlibxml2-2.7.6-17.el6_6.1.ppc64.rpm\nlibxml2-debuginfo-2.7.6-17.el6_6.1.ppc.rpm\nlibxml2-debuginfo-2.7.6-17.el6_6.1.ppc64.rpm\nlibxml2-devel-2.7.6-17.el6_6.1.ppc.rpm\nlibxml2-devel-2.7.6-17.el6_6.1.ppc64.rpm\nlibxml2-python-2.7.6-17.el6_6.1.ppc64.rpm\n\ns390x:\nlibxml2-2.7.6-17.el6_6.1.s390.rpm\nlibxml2-2.7.6-17.el6_6.1.s390x.rpm\nlibxml2-debuginfo-2.7.6-17.el6_6.1.s390.rpm\nlibxml2-debuginfo-2.7.6-17.el6_6.1.s390x.rpm\nlibxml2-devel-2.7.6-17.el6_6.1.s390.rpm\nlibxml2-devel-2.7.6-17.el6_6.1.s390x.rpm\nlibxml2-python-2.7.6-17.el6_6.1.s390x.rpm\n\nx86_64:\nlibxml2-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-2.7.6-17.el6_6.1.x86_64.rpm\nlibxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm\nlibxml2-devel-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-devel-2.7.6-17.el6_6.1.x86_64.rpm\nlibxml2-python-2.7.6-17.el6_6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nlibxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-static-2.7.6-17.el6_6.1.i686.rpm\n\nppc64:\nlibxml2-debuginfo-2.7.6-17.el6_6.1.ppc64.rpm\nlibxml2-static-2.7.6-17.el6_6.1.ppc64.rpm\n\ns390x:\nlibxml2-debuginfo-2.7.6-17.el6_6.1.s390x.rpm\nlibxml2-static-2.7.6-17.el6_6.1.s390x.rpm\n\nx86_64:\nlibxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm\nlibxml2-static-2.7.6-17.el6_6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nlibxml2-2.7.6-17.el6_6.1.src.rpm\n\ni386:\nlibxml2-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-devel-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-python-2.7.6-17.el6_6.1.i686.rpm\n\nx86_64:\nlibxml2-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-2.7.6-17.el6_6.1.x86_64.rpm\nlibxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm\nlibxml2-devel-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-devel-2.7.6-17.el6_6.1.x86_64.rpm\nlibxml2-python-2.7.6-17.el6_6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nlibxml2-debuginfo-2.7.6-17.el6_6.1.i686.rpm\nlibxml2-static-2.7.6-17.el6_6.1.i686.rpm\n\nx86_64:\nlibxml2-debuginfo-2.7.6-17.el6_6.1.x86_64.rpm\nlibxml2-static-2.7.6-17.el6_6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nlibxml2-2.9.1-5.el7_0.1.src.rpm\n\nx86_64:\nlibxml2-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-2.9.1-5.el7_0.1.x86_64.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm\nlibxml2-python-2.9.1-5.el7_0.1.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nlibxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm\nlibxml2-devel-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-devel-2.9.1-5.el7_0.1.x86_64.rpm\nlibxml2-static-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-static-2.9.1-5.el7_0.1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nlibxml2-2.9.1-5.el7_0.1.src.rpm\n\nx86_64:\nlibxml2-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-2.9.1-5.el7_0.1.x86_64.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm\nlibxml2-python-2.9.1-5.el7_0.1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nlibxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm\nlibxml2-devel-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-devel-2.9.1-5.el7_0.1.x86_64.rpm\nlibxml2-static-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-static-2.9.1-5.el7_0.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nlibxml2-2.9.1-5.el7_0.1.src.rpm\n\nppc64:\nlibxml2-2.9.1-5.el7_0.1.ppc.rpm\nlibxml2-2.9.1-5.el7_0.1.ppc64.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.ppc.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.ppc64.rpm\nlibxml2-devel-2.9.1-5.el7_0.1.ppc.rpm\nlibxml2-devel-2.9.1-5.el7_0.1.ppc64.rpm\nlibxml2-python-2.9.1-5.el7_0.1.ppc64.rpm\n\ns390x:\nlibxml2-2.9.1-5.el7_0.1.s390.rpm\nlibxml2-2.9.1-5.el7_0.1.s390x.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.s390.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.s390x.rpm\nlibxml2-devel-2.9.1-5.el7_0.1.s390.rpm\nlibxml2-devel-2.9.1-5.el7_0.1.s390x.rpm\nlibxml2-python-2.9.1-5.el7_0.1.s390x.rpm\n\nx86_64:\nlibxml2-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-2.9.1-5.el7_0.1.x86_64.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm\nlibxml2-devel-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-devel-2.9.1-5.el7_0.1.x86_64.rpm\nlibxml2-python-2.9.1-5.el7_0.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nlibxml2-debuginfo-2.9.1-5.el7_0.1.ppc.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.ppc64.rpm\nlibxml2-static-2.9.1-5.el7_0.1.ppc.rpm\nlibxml2-static-2.9.1-5.el7_0.1.ppc64.rpm\n\ns390x:\nlibxml2-debuginfo-2.9.1-5.el7_0.1.s390.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.s390x.rpm\nlibxml2-static-2.9.1-5.el7_0.1.s390.rpm\nlibxml2-static-2.9.1-5.el7_0.1.s390x.rpm\n\nx86_64:\nlibxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm\nlibxml2-static-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-static-2.9.1-5.el7_0.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nlibxml2-2.9.1-5.el7_0.1.src.rpm\n\nx86_64:\nlibxml2-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-2.9.1-5.el7_0.1.x86_64.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm\nlibxml2-devel-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-devel-2.9.1-5.el7_0.1.x86_64.rpm\nlibxml2-python-2.9.1-5.el7_0.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nlibxml2-debuginfo-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-debuginfo-2.9.1-5.el7_0.1.x86_64.rpm\nlibxml2-static-2.9.1-5.el7_0.1.i686.rpm\nlibxml2-static-2.9.1-5.el7_0.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2014-3660.html\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc", "sources": [ { "db": "NVD", "id": "CVE-2014-3660" }, { "db": "JVNDB", "id": "JVNDB-2014-005228" }, { "db": "BID", "id": "70644" }, { "db": "VULHUB", "id": "VHN-71600" }, { "db": "VULMON", "id": "CVE-2014-3660" }, { "db": "PACKETSTORM", "id": "129482" }, { "db": "PACKETSTORM", "id": "128845" }, { "db": "PACKETSTORM", "id": "135966" }, { "db": "PACKETSTORM", "id": "131119" }, { "db": "PACKETSTORM", "id": "130144" }, { "db": "PACKETSTORM", "id": "133080" }, { "db": "PACKETSTORM", "id": "128709" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-3660", "trust": 3.6 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2014/10/17/7", "trust": 2.0 }, { "db": "BID", "id": "70644", "trust": 1.5 }, { "db": "SECUNIA", "id": "61991", "trust": 1.2 }, { "db": "SECUNIA", "id": "61966", "trust": 1.2 }, { "db": "SECUNIA", "id": "59903", "trust": 1.2 }, { "db": "SECUNIA", "id": "61965", "trust": 1.2 }, { "db": "JUNIPER", "id": "JSA10705", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2014-005228", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201410-1338", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2023.3732", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "128845", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "129482", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "128709", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "128837", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129197", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128847", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-71600", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2014-3660", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "135966", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "131119", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "130144", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133080", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-71600" }, { "db": "VULMON", "id": "CVE-2014-3660" }, { "db": "BID", "id": "70644" }, { "db": "JVNDB", "id": "JVNDB-2014-005228" }, { "db": "PACKETSTORM", "id": "129482" }, { "db": "PACKETSTORM", "id": "128845" }, { "db": "PACKETSTORM", "id": "135966" }, { "db": "PACKETSTORM", "id": "131119" }, { "db": "PACKETSTORM", "id": "130144" }, { "db": "PACKETSTORM", "id": "133080" }, { "db": "PACKETSTORM", "id": "128709" }, { "db": "CNNVD", "id": "CNNVD-201410-1338" }, { "db": "NVD", "id": "CVE-2014-3660" } ] }, "id": "VAR-201411-0450", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-71600" } ], "trust": 0.32222222 }, "last_update_date": "2024-07-23T20:10:22.216000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2015-08-13-3 iOS 8.4.1", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2015/aug/msg00002.html" }, { "title": "APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html" }, { "title": "HT205030", "trust": 0.8, "url": "https://support.apple.com/en-us/ht205030" }, { "title": "HT205031", "trust": 0.8, "url": "https://support.apple.com/en-us/ht205031" }, { "title": "HT205030", "trust": 0.8, "url": "https://support.apple.com/ja-jp/ht205030" }, { "title": "HT205031", "trust": 0.8, "url": "https://support.apple.com/ja-jp/ht205031" }, { "title": "openSUSE-SU-2014:1330", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html" }, { "title": "Oracle Third Party Bulletin - January 2015", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "title": "Attachment #944444", "trust": 0.8, "url": "https://bugzilla.redhat.com/attachment.cgi?id=944444\u0026action=diff" }, { "title": "Bug 1149084", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1149084" }, { "title": "RHSA-2014:1885", "trust": 0.8, "url": "http://rhn.redhat.com/errata/rhsa-2014-1885.html" }, { "title": "RHSA-2014:1655", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2014-1655.html" }, { "title": "USN-2389-1", "trust": 0.8, "url": "http://www.ubuntu.com/usn/usn-2389-1/" }, { "title": "Top Page", "trust": 0.8, "url": "http://xmlsoft.org/index.html" }, { "title": "libxml2-2.9.2-win32-x86_64", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=55451" }, { "title": "Ubuntu Security Notice: libxml2 vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-2389-1" }, { "title": "Debian CVElist Bug Report Logs: CVE-2014-3660 libxml2 billion laugh variant", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=5683b390d2b4504ec2ce5aff42cc28e1" }, { "title": "Amazon Linux AMI: ALAS-2014-444", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2014-444" }, { "title": "Red Hat: CVE-2014-3660", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2014-3660" }, { "title": "VMware Security Advisories: VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address security issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=6e6083adbf6a5be47af800d437e987a5" }, { "title": "Debian CVElist Bug Report Logs: libxml2: CVE-2015-1819: denial of service processing a crafted XML document", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=d4df89c444b497f8334824cafc13f268" }, { "title": "Debian CVElist Bug Report Logs: libxml2: out-of-bounds read", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=7cf75e4a67dc759cf112b117265731c9" }, { "title": "Debian CVElist Bug Report Logs: libxml2: parsing an unclosed comment can result in `Conditional jump or move depends on uninitialised value(s)` and unsafe memory access", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=2e6915a419592c0eb35235af4b02c926" }, { "title": "Apple: Apple TV 7.2.1", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=7fd0c8e5493266a37a14d1b8b5c5ece7" }, { "title": "Apple: iOS 8.4.1", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=1e360caea44107f4b635ae5265ed4e38" }, { "title": "Apple: OS X Yosemite v10.10.5 and Security Update 2015-006", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=9834d0d73bf28fb80d3390930bafd906" }, { "title": "Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - July 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins\u0026qid=6c15273f6bf4a785175f27073b98a1ce" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - January 2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=eaf98750f1130c39e83765575c69e165" }, { "title": "nokogiri-strdup-segfault-mwe", "trust": 0.1, "url": "https://github.com/projectivetech/nokogiri-strdup-segfault-mwe " }, { "title": "nokogiri-strdup-segfault-mwe", "trust": 0.1, "url": "https://github.com/flavoursys/nokogiri-strdup-segfault-mwe " }, { "title": "exploits", "trust": 0.1, "url": "https://github.com/hackerhouse-opensource/exploits " }, { "title": "The Register", "trust": 0.1, "url": "https://www.theregister.co.uk/2016/02/26/remote_god_mode_code_exec_star_in_apple_tv_3_patch_party_premiere/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-3660" }, { "db": "JVNDB", "id": "JVNDB-2014-005228" }, { "db": "CNNVD", "id": "CNNVD-201410-1338" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-005228" }, { "db": "NVD", "id": "CVE-2014-3660" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://www.openwall.com/lists/oss-security/2014/10/17/7" }, { "trust": 1.5, "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "trust": 1.5, "url": "https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html" }, { "trust": 1.3, "url": "http://www.securityfocus.com/bid/70644" }, { "trust": 1.3, "url": "http://rhn.redhat.com/errata/rhsa-2014-1655.html" }, { "trust": 1.3, "url": "http://www.ubuntu.com/usn/usn-2389-1" }, { "trust": 1.2, "url": "http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html" }, { "trust": 1.2, "url": "http://lists.apple.com/archives/security-announce/2015/aug/msg00002.html" }, { "trust": 1.2, "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "trust": 1.2, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1149084" }, { "trust": 1.2, "url": "https://support.apple.com/kb/ht205030" }, { "trust": 1.2, "url": "https://support.apple.com/kb/ht205031" }, { "trust": 1.2, "url": "http://www.debian.org/security/2014/dsa-3057" }, { "trust": 1.2, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2014:244" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2014-1885.html" }, { "trust": 1.2, "url": "http://secunia.com/advisories/59903" }, { "trust": 1.2, "url": "http://secunia.com/advisories/61965" }, { "trust": 1.2, "url": "http://secunia.com/advisories/61966" }, { "trust": 1.2, "url": "http://secunia.com/advisories/61991" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" }, { "trust": 1.1, "url": "https://bugzilla.redhat.com/attachment.cgi?id=944444\u0026action=diff" }, { "trust": 1.1, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10705" }, { "trust": 1.0, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3660" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3660" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3660" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2023.3732" }, { "trust": 0.3, "url": "http://www.apple.com/ios/" }, { "trust": 0.3, "url": "https://www.apple.com/osx/" }, { "trust": 0.3, "url": "https://git.gnome.org/browse/libxml2/commit/?id=be2a7edaf289c5da74a4f9ed3a0b6c733e775230" }, { "trust": 0.3, "url": "http://www.apple.com/ipad/" }, { "trust": 0.3, "url": "http://www.apple.com/iphone/" }, { "trust": 0.3, "url": "http://www.apple.com/ipodtouch/" }, { "trust": 0.3, "url": "http://seclists.org/oss-sec/2014/q4/378" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/101007010" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098592" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097607" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21690824" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5098306" }, { "trust": 0.3, "url": "http://www.vmware.com/security/advisories/vmsa-2015-0001.html " }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/101009000" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097736" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0191" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3733" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3741" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3732" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3736" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3751" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3730" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3752" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3748" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3749" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3738" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3744" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3746" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3742" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3731" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-6685" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3734" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3740" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3750" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3743" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3747" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3735" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3737" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3745" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3753" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3739" }, { "trust": 0.1, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10705" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/attachment.cgi?id=944444\u0026amp;action=diff" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://github.com/projectivetech/nokogiri-strdup-segfault-mwe" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-3660" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=36123" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2389-1/" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201412-06.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3660" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/libxml2/2.7.8.dfsg-5.1ubuntu4.11" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/libxml2/2.7.6.dfsg-1ubuntu1.15" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/libxml2/2.9.1+dfsg1-3ubuntu4.4" }, { "trust": 0.1, "url": "https://gpgtools.org" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3759" }, { "trust": 0.1, "url": "http://advisories.mageia.org/mgasa-2014-0214.html" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/advisories/" }, { "trust": 0.1, "url": "http://advisories.mageia.org/mgasa-2014-0418.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0191" }, { "trust": 0.1, "url": "https://twitter.com/vmwaresrc" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1044" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1044" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2078735" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2070666" }, { "trust": 0.1, "url": "http://www.vmware.com/security/advisories" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3513" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3567" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1043" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8370" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2075521" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2065832" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3513" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1055" }, { "trust": 0.1, "url": "https://www.vmware.com/go/downloadplayer" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3568" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3567" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1043" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3568" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/lifecycle.html" }, { "trust": 0.1, "url": "https://www.vmware.com/go/downloadworkstation" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2099265" }, { "trust": 0.1, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8370" }, { "trust": 0.1, "url": "https://www.vmware.com/go/download-vsphere" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3566" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3729" }, { "trust": 0.1, "url": "https://www.apple.com/itunes/" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-3660.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-71600" }, { "db": "VULMON", "id": "CVE-2014-3660" }, { "db": "BID", "id": "70644" }, { "db": "JVNDB", "id": "JVNDB-2014-005228" }, { "db": "PACKETSTORM", "id": "129482" }, { "db": "PACKETSTORM", "id": "128845" }, { "db": "PACKETSTORM", "id": "135966" }, { "db": "PACKETSTORM", "id": "131119" }, { "db": "PACKETSTORM", "id": "130144" }, { "db": "PACKETSTORM", "id": "133080" }, { "db": "PACKETSTORM", "id": "128709" }, { "db": "CNNVD", "id": "CNNVD-201410-1338" }, { "db": "NVD", "id": "CVE-2014-3660" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-71600" }, { "db": "VULMON", "id": "CVE-2014-3660" }, { "db": "BID", "id": "70644" }, { "db": "JVNDB", "id": "JVNDB-2014-005228" }, { "db": "PACKETSTORM", "id": "129482" }, { "db": "PACKETSTORM", "id": "128845" }, { "db": "PACKETSTORM", "id": "135966" }, { "db": "PACKETSTORM", "id": "131119" }, { "db": "PACKETSTORM", "id": "130144" }, { "db": "PACKETSTORM", "id": "133080" }, { "db": "PACKETSTORM", "id": "128709" }, { "db": "CNNVD", "id": "CNNVD-201410-1338" }, { "db": "NVD", "id": "CVE-2014-3660" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-11-04T00:00:00", "db": "VULHUB", "id": "VHN-71600" }, { "date": "2014-11-04T00:00:00", "db": "VULMON", "id": "CVE-2014-3660" }, { "date": "2014-10-17T00:00:00", "db": "BID", "id": "70644" }, { "date": "2014-11-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-005228" }, { "date": "2014-12-11T16:10:57", "db": "PACKETSTORM", "id": "129482" }, { "date": "2014-10-27T22:06:01", "db": "PACKETSTORM", "id": "128845" }, { "date": "2016-02-26T22:22:22", "db": "PACKETSTORM", "id": "135966" }, { "date": "2015-03-30T21:34:46", "db": "PACKETSTORM", "id": "131119" }, { "date": "2015-01-28T18:22:00", "db": "PACKETSTORM", "id": "130144" }, { "date": "2015-08-13T22:18:25", "db": "PACKETSTORM", "id": "133080" }, { "date": "2014-10-17T00:03:41", "db": "PACKETSTORM", "id": "128709" }, { "date": "2014-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201410-1338" }, { "date": "2014-11-04T16:55:06.043000", "db": "NVD", "id": "CVE-2014-3660" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-08T00:00:00", "db": "VULHUB", "id": "VHN-71600" }, { "date": "2016-12-08T00:00:00", "db": "VULMON", "id": "CVE-2014-3660" }, { "date": "2016-07-29T17:00:00", "db": "BID", "id": "70644" }, { "date": "2015-08-31T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-005228" }, { "date": "2023-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201410-1338" }, { "date": "2016-12-08T03:05:40.590000", "db": "NVD", "id": "CVE-2014-3660" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "131119" }, { "db": "PACKETSTORM", "id": "128709" }, { "db": "CNNVD", "id": "CNNVD-201410-1338" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "libxml2 of parser.c Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-005228" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "70644" } ], "trust": 0.3 } }
gsd-2014-3660
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2014-3660", "description": "parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the \"billion laughs\" attack.", "id": "GSD-2014-3660", "references": [ "https://www.suse.com/security/cve/CVE-2014-3660.html", "https://www.debian.org/security/2014/dsa-3057", "https://access.redhat.com/errata/RHSA-2014:1885", "https://access.redhat.com/errata/RHSA-2014:1655", "https://ubuntu.com/security/CVE-2014-3660", "https://advisories.mageia.org/CVE-2014-3660.html", "https://alas.aws.amazon.com/cve/html/CVE-2014-3660.html", "https://linux.oracle.com/cve/CVE-2014-3660.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-3660" ], "details": "parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the \"billion laughs\" attack.", "id": "GSD-2014-3660", "modified": "2023-12-13T01:22:53.732228Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3660", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the \"billion laughs\" attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "59903", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59903" }, { "name": "https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html", "refsource": "MISC", "url": "https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html" }, { "name": "DSA-3057", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3057" }, { "name": "https://support.apple.com/kb/HT205030", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT205030" }, { "name": "70644", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70644" }, { "name": "openSUSE-SU-2014:1330", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html" }, { "name": "https://bugzilla.redhat.com/attachment.cgi?id=944444\u0026action=diff", "refsource": "MISC", "url": "https://bugzilla.redhat.com/attachment.cgi?id=944444\u0026action=diff" }, { "name": "61966", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61966" }, { "name": "61965", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61965" }, { "name": "USN-2389-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2389-1" }, { "name": "APPLE-SA-2015-08-13-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "APPLE-SA-2015-08-13-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html" }, { "name": "[oss-security] 20141017 libxml2 issue: billioun laughs variant (CVE-2014-3660)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/10/17/7" }, { "name": "MDVSA-2014:244", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:244" }, { "name": "RHSA-2014:1655", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1655.html" }, { "name": "RHSA-2014:1885", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1885.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1149084", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1149084" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "name": "61991", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61991" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" }, { "name": "openSUSE-SU-2015:2372", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" }, { "name": "https://support.apple.com/kb/HT205031", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT205031" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "[2.0.0,2.7.2]", "affected_versions": "All versions starting from 2.0.0 up to 2.7.2", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2016-12-08", "description": "parser.c in libxml2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the \"billion laughs\" attack.", "fixed_versions": [ "2.7.8.2" ], "identifier": "CVE-2014-3660", "identifiers": [ "CVE-2014-3660" ], "not_impacted": "All versions before 2.0.0, all versions after 2.7.2", "package_slug": "nuget/libxml2", "pubdate": "2014-11-04", "solution": "Upgrade to version 2.7.8.2 or above.", "title": "Uncontrolled Resource Consumption", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2014-3660" ], "uuid": "24b67d48-f0d9-4f22-b676-fd292200f401" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.9.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.9.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.0:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.5.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:xmlsoft:libxml2:2.7.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.10.4", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-3660" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the \"billion laughs\" attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html", "refsource": "MISC", "tags": [], "url": "https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html" }, { "name": "70644", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/70644" }, { "name": "RHSA-2014:1655", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1655.html" }, { "name": "openSUSE-SU-2014:1330", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html" }, { "name": "[oss-security] 20141017 libxml2 issue: billioun laughs variant (CVE-2014-3660)", "refsource": "MLIST", "tags": [ "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2014/10/17/7" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1149084", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1149084" }, { "name": "DSA-3057", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2014/dsa-3057" }, { "name": "https://bugzilla.redhat.com/attachment.cgi?id=944444\u0026action=diff", "refsource": "MISC", "tags": [], "url": "https://bugzilla.redhat.com/attachment.cgi?id=944444\u0026action=diff" }, { "name": "USN-2389-1", "refsource": "UBUNTU", "tags": [ "Vendor Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2389-1" }, { "name": "61991", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61991" }, { "name": "61966", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61966" }, { "name": "61965", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/61965" }, { "name": "RHSA-2014:1885", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1885.html" }, { "name": "59903", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/59903" }, { "name": "MDVSA-2014:244", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:244" }, { "name": "https://support.apple.com/kb/HT205030", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/kb/HT205030" }, { "name": "APPLE-SA-2015-08-13-2", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html" }, { "name": "APPLE-SA-2015-08-13-3", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html" }, { "name": "https://support.apple.com/kb/HT205031", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/kb/HT205031" }, { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html" }, { "name": "openSUSE-SU-2015:2372", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705", "refsource": "CONFIRM", "tags": [], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2016-12-08T03:05Z", "publishedDate": "2014-11-04T16:55Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.