Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2016-0718
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:03.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2016:2824", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2824.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.tenable.com/security/tns-2016-20" }, { "name": "1037705", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037705" }, { "name": "1036415", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036415" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "USN-2983-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2983-1" }, { "name": "openSUSE-SU-2016:1523", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.eset.com/ca6333/" }, { "name": "90729", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/90729" }, { "name": "USN-3044-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "name": "[oss-security] 20160517 CVE-2016-0718: Expat XML Parser Crashes on Malformed Input", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "name": "APPLE-SA-2016-07-18-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "name": "SUSE-SU-2016:1508", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "name": "20170227 CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/68" }, { "name": "GLSA-201701-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-21" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "DSA-3582", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3582" }, { "name": "SUSE-SU-2016:1512", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "name": "openSUSE-SU-2016:1964", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "name": "RHSA-2018:2486", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "1036348", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036348" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT206903" }, { "name": "openSUSE-SU-2016:1441", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "name": "openSUSE-SU-2016:2026", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-31T07:06:39", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2016:2824", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2824.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.tenable.com/security/tns-2016-20" }, { "name": "1037705", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037705" }, { "name": "1036415", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036415" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "USN-2983-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2983-1" }, { "name": "openSUSE-SU-2016:1523", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.eset.com/ca6333/" }, { "name": "90729", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/90729" }, { "name": "USN-3044-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "name": "[oss-security] 20160517 CVE-2016-0718: Expat XML Parser Crashes on Malformed Input", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "name": "APPLE-SA-2016-07-18-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "name": "SUSE-SU-2016:1508", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "name": "20170227 CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/68" }, { "name": "GLSA-201701-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-21" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "DSA-3582", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3582" }, { "name": "SUSE-SU-2016:1512", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "name": "openSUSE-SU-2016:1964", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "name": "RHSA-2018:2486", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "1036348", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036348" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT206903" }, { "name": "openSUSE-SU-2016:1441", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "name": "openSUSE-SU-2016:2026", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-0718", "datePublished": "2016-05-26T16:00:00", "dateReserved": "2015-12-16T00:00:00", "dateUpdated": "2024-08-05T22:30:03.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-0718\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-05-26T16:59:00.133\",\"lastModified\":\"2024-11-21T02:42:14.723\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.\"},{\"lang\":\"es\",\"value\":\"Expat permite a atacantes dependientes del contexto provocar una denegaci\u00f3n de servicio (ca\u00edda) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un documento de entrada mal formado, lo que desencadena un desbordamiento de buffer.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"48.0\",\"matchCriteriaId\":\"9779CA44-29CF-4995-B10E-F9239E989280\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.11.0\",\"versionEndIncluding\":\"10.11.5\",\"matchCriteriaId\":\"8FB26959-7A01-4772-9C34-8836B958CB0A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F892F1B0-514C-42F7-90AE-12ACDFDC1033\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74BCA435-7594-49E8-9BAE-9E02E129B6C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"55C5561F-BE86-4EEA-99D4-8697F8BD9DFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D41A798E-0D69-43C7-9A63-1E5921138EAC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4863BE36-D16A-4D75-90D9-FD76DB5B48B7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0BA503-3F96-48DA-AF47-FBA37A9D0C48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"15FC9014-BD85-4382-9D04-C0703E901D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2076747F-A98E-4DD9-9B52-BF1732BCAD3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"1831D45A-EE6E-4220-8F8C-248B69520948\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A633996-2FD7-467C-BAA6-529E16BD06D1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.2.0\",\"matchCriteriaId\":\"BE4EECEA-61AE-4AD0-87C2-89DC1890DDDD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10BC294-9196-425F-9FB0-B1625465B47F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03117DF1-3BEC-4B8D-AD63-DBBDB2126081\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.5.1\",\"matchCriteriaId\":\"CB739B3A-20BB-4118-82DD-7ACFE5881FE2\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.7.0\",\"versionEndExcluding\":\"2.7.15\",\"matchCriteriaId\":\"CF6ABED2-9492-42E0-80A7-AB77C2900E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.3.0\",\"versionEndExcluding\":\"3.3.7\",\"matchCriteriaId\":\"2E822AE7-709A-4DA4-B2C6-7A5968AE62FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.4.0\",\"versionEndExcluding\":\"3.4.7\",\"matchCriteriaId\":\"E65C03FE-52E0-477A-A104-8F2CC0EEE753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.0\",\"versionEndExcluding\":\"3.5.4\",\"matchCriteriaId\":\"9C0FE3B2-27E6-4DA9-8479-B34E3014AC55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.6.0\",\"versionEndExcluding\":\"3.6.2\",\"matchCriteriaId\":\"0AAF5776-8121-49B5-A6AE-815B7CCAC307\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2824.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2017/Feb/68\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://support.eset.com/ca6333/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3582\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mozilla.org/security/announce/2016/mfsa2016-68.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/05/17/12\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/90729\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036348\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036415\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037705\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2983-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3044-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2486\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1236923\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1296102\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201701-21\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2016-11-01.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/HT206903\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2016-20\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2824.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2017/Feb/68\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://support.eset.com/ca6333/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3582\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mozilla.org/security/announce/2016/mfsa2016-68.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/05/17/12\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/90729\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036348\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036415\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2983-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3044-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2486\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1236923\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1296102\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201701-21\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2016-11-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/HT206903\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2016-20\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
var-201605-0145
Vulnerability from variot
Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow. There is a security hole in Expat. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update Advisory ID: RHSA-2018:2486-01 Product: Red Hat JBoss Core Services Advisory URL: https://access.redhat.com/errata/RHSA-2018:2486 Issue date: 2018-08-16 CVE Names: CVE-2016-0718 CVE-2016-7167 CVE-2016-8615 CVE-2016-8616 CVE-2016-8617 CVE-2016-8618 CVE-2016-8619 CVE-2016-8621 CVE-2016-8622 CVE-2016-8623 CVE-2016-8624 CVE-2016-8625 CVE-2016-9598 CVE-2017-6004 CVE-2017-7186 CVE-2017-7244 CVE-2017-7245 CVE-2017-7246 CVE-2017-1000254 CVE-2017-1000257 CVE-2018-0500 ==================================================================== 1. Summary:
Red Hat JBoss Core Services Pack Apache Server 2.4.29 packages for Microsoft Windows and Oracle Solaris are now available.
Red Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Description:
This release adds the new Apache HTTP Server 2.4.29 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.
Security Fix(es):
- expat: Out-of-bounds heap read on crafted input causing crash (CVE-2016-0718)
- curl: escape and unescape integer overflows (CVE-2016-7167)
- curl: Cookie injection for other servers (CVE-2016-8615)
- curl: Case insensitive password comparison (CVE-2016-8616)
- curl: Out-of-bounds write via unchecked multiplication (CVE-2016-8617)
- curl: Double-free in curl_maprintf (CVE-2016-8618)
- curl: Double-free in krb5 code (CVE-2016-8619)
- curl: curl_getdate out-of-bounds read (CVE-2016-8621)
- curl: URL unescape heap overflow via integer truncation (CVE-2016-8622)
- curl: Use-after-free via shared cookies (CVE-2016-8623)
- curl: Invalid URL parsing with '#' (CVE-2016-8624)
- curl: IDNA 2003 makes curl use wrong host (CVE-2016-8625)
- libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS) (CVE-2016-9598)
- pcre: Out-of-bounds read in compile_bracket_matchingpath function (8.41/3) (CVE-2017-6004)
- pcre: Invalid Unicode property lookup (8.41/7, 10.24/2) (CVE-2017-7186)
- pcre: invalid memory read in_pcre32_xclass (pcre_xclass.c) (CVE-2017-7244)
- pcre: stack-based buffer overflow write in pcre32_copy_substring (CVE-2017-7245)
- pcre: stack-based buffer overflow write in pcre32_copy_substring (CVE-2017-7246)
- curl: FTP PWD response parser out of bounds read (CVE-2017-1000254)
- curl: IMAP FETCH response out of bounds read (CVE-2017-1000257)
- curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP (CVE-2018-0500)
Details around this issue, including information about the CVE, severity of the issue, and the CVSS score can be found on the CVE page listed in the Reference section below.
The following packages have been upgraded to a newer upstream version: * Curl (7.57.0) * OpenSSL (1.0.2n) * Expat (2.2.5) * PCRE (8.41) * libxml2 (2.9.7)
Acknowledgements:
CVE-2017-1000254: Red Hat would like to thank Daniel Stenberg for reporting this issue. Upstream acknowledges Max Dymond as the original reporter. CVE-2017-1000257: Red Hat would like to thank the Curl project for reporting this issue. Upstream acknowledges Brian Carpenter, (the OSS-Fuzz project) as the original reporter. CVE-2018-0500: Red Hat would like to thank the Curl project for reporting this issue.
- Solution:
The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).
- Bugs fixed (https://bugzilla.redhat.com/):
1296102 - CVE-2016-0718 expat: Out-of-bounds heap read on crafted input causing crash 1375906 - CVE-2016-7167 curl: escape and unescape integer overflows 1388370 - CVE-2016-8615 curl: Cookie injection for other servers 1388371 - CVE-2016-8616 curl: Case insensitive password comparison 1388377 - CVE-2016-8617 curl: Out-of-bounds write via unchecked multiplication 1388378 - CVE-2016-8618 curl: Double-free in curl_maprintf 1388379 - CVE-2016-8619 curl: Double-free in krb5 code 1388385 - CVE-2016-8621 curl: curl_getdate out-of-bounds read 1388386 - CVE-2016-8622 curl: URL unescape heap overflow via integer truncation 1388388 - CVE-2016-8623 curl: Use-after-free via shared cookies 1388390 - CVE-2016-8624 curl: Invalid URL parsing with '#' 1388392 - CVE-2016-8625 curl: IDNA 2003 makes curl use wrong host 1408306 - CVE-2016-9598 libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS) 1425365 - CVE-2017-6004 pcre: Out-of-bounds read in compile_bracket_matchingpath function (8.41/3) 1434504 - CVE-2017-7186 pcre: Invalid Unicode property lookup (8.41/7, 10.24/2) 1437364 - CVE-2017-7244 pcre: invalid memory read in _pcre32_xclass (pcre_xclass.c) 1437367 - CVE-2017-7245 pcre: stack-based buffer overflow write in pcre32_copy_substring 1437369 - CVE-2017-7246 pcre: stack-based buffer overflow write in pcre32_copy_substring 1495541 - CVE-2017-1000254 curl: FTP PWD response parser out of bounds read 1503705 - CVE-2017-1000257 curl: IMAP FETCH response out of bounds read 1597101 - CVE-2018-0500 curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP
- References:
https://access.redhat.com/security/cve/CVE-2016-0718 https://access.redhat.com/security/cve/CVE-2016-7167 https://access.redhat.com/security/cve/CVE-2016-8615 https://access.redhat.com/security/cve/CVE-2016-8616 https://access.redhat.com/security/cve/CVE-2016-8617 https://access.redhat.com/security/cve/CVE-2016-8618 https://access.redhat.com/security/cve/CVE-2016-8619 https://access.redhat.com/security/cve/CVE-2016-8621 https://access.redhat.com/security/cve/CVE-2016-8622 https://access.redhat.com/security/cve/CVE-2016-8623 https://access.redhat.com/security/cve/CVE-2016-8624 https://access.redhat.com/security/cve/CVE-2016-8625 https://access.redhat.com/security/cve/CVE-2016-9598 https://access.redhat.com/security/cve/CVE-2017-6004 https://access.redhat.com/security/cve/CVE-2017-7186 https://access.redhat.com/security/cve/CVE-2017-7244 https://access.redhat.com/security/cve/CVE-2017-7245 https://access.redhat.com/security/cve/CVE-2017-7246 https://access.redhat.com/security/cve/CVE-2017-1000254 https://access.redhat.com/security/cve/CVE-2017-1000257 https://access.redhat.com/security/cve/CVE-2018-0500 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/html-single/red_hat_jboss_core_services_apache_http_server_2.4.29_release_notes/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBW3WhLtzjgjWX9erEAQgw7g//Qz9zXKXcAGEiJLq910Gqgdj6IeJD7Zy1 lvB63+tVL79Rr7X1/rL8EYNoDYw7+MQJeFgWhCwGFPLJi43O3q5cDANVK8/9nUJp UV5QzGC62ncurV3U4MF8DWUcJYpi2QhvlV3O++0dVjx4ETJgBTBSGUpUeEzcYNjM 3LsNmroNWIURAyNsBzO3KgrQhWwJ3vM5e7X6Xgy44S07Kgs2yrArtcsHYjqlDzzR X3Yo8G97DurTikcIWcXs45w9rdKXNSheGRKL7Jp/mzoqCKV4RbieRM12L05MwXmi ZNTMdhJzd+aA3Kwx9JjOjSv8MJErRioUKZEisaH0VWnwTiQc4sOlIXgMuJBV+ZGo RZz0d4sQ1HkeTQKFHkt85abdEiK6OLtKpdZns0VvqqtfdaHJqitqaAfrvssc3D+R usY7sGrlm4rAyYSddWUlLgrF3KZq7PoxVqj+15NkvBisXPp6xwgSiu8aoxziIiNq 0UWQG7KvdlbmrlzNOBBe96COI3UK36AxUXMK6abPzW6VmlY6O1x2OPPgNcItOFVp /o2p3HalPrucwjfwADBGvlbc+SRUguNdnftvmAG3DO1Oon4OnRdoPerNBkY7QRRC Ke88RWnjA37kZ7bBL3Mag6rX8vIlZoy0g1563AnzvexpXiywy6fU4UNpkCHNulNH oPmWeYAK/SE=5slr -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . From: Marc Deslauriers marc.deslauriers@canonical.com Reply-To: Ubuntu Security security@ubuntu.com To: ubuntu-security-announce@lists.ubuntu.com Message-ID: 57683228.8060901@canonical.com Subject: [USN-3013-1] XML-RPC for C and C++ vulnerabilities
============================================================================ Ubuntu Security Notice USN-3013-1 June 20, 2016
xmlrpc-c vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in XML-RPC for C and C++.
Software Description: - xmlrpc-c: Lightweight RPC library based on XML and HTTP
Details:
It was discovered that the Expat code in XML-RPC for C and C++ unexpectedly called srand in certain circumstances. This could reduce the security of calling applications. (CVE-2012-6702)
It was discovered that the Expat code in XML-RPC for C and C++ incorrectly handled seeding the random number generator. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2016-5300)
Gustavo Grieco discovered that the Expat code in XML-RPC for C and C++ incorrectly handled malformed XML data. (CVE-2016-0718)
It was discovered that the Expat code in XML-RPC for C and C++ incorrectly handled malformed XML data. (CVE-2015-1283, CVE-2016-4472)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 LTS: libxmlrpc-c++4 1.16.33-3.1ubuntu5.2 libxmlrpc-core-c3 1.16.33-3.1ubuntu5.2
After a standard system upgrade you need to restart any applications linked against XML-RPC for C and C++ to effect the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
[slackware-security] expat (SSA:2016-359-01)
New expat packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/expat-2.2.0-i586-1_slack14.2.txz: Upgraded. This update fixes bugs and security issues: Multiple integer overflows in XML_GetBuffer. Fix crash on malformed input. Improve insufficient fix to CVE-2015-1283 / CVE-2015-2716. Use more entropy for hash initialization. Resolve troublesome internal call to srand. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1283 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702 ( Security fix ) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/expat-2.2.0-i486-1_slack13.0.txz
Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/expat-2.2.0-x86_64-1_slack13.0.txz
Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/expat-2.2.0-i486-1_slack13.1.txz
Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/expat-2.2.0-x86_64-1_slack13.1.txz
Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/expat-2.2.0-i486-1_slack13.37.txz
Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/expat-2.2.0-x86_64-1_slack13.37.txz
Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/expat-2.2.0-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/expat-2.2.0-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/expat-2.2.0-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/expat-2.2.0-x86_64-1_slack14.1.txz
Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/expat-2.2.0-i586-1_slack14.2.txz
Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/expat-2.2.0-x86_64-1_slack14.2.txz
Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/expat-2.2.0-i586-1.txz
Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/expat-2.2.0-x86_64-1.txz
MD5 signatures: +-------------+
Slackware 13.0 package: d042603604cda3dedb7a75cb049071c8 expat-2.2.0-i486-1_slack13.0.txz
Slackware x86_64 13.0 package: 4c57af80cc3ccd277a365f8053dabd9b expat-2.2.0-x86_64-1_slack13.0.txz
Slackware 13.1 package: 649682e89895159e90c0775f056a5b2a expat-2.2.0-i486-1_slack13.1.txz
Slackware x86_64 13.1 package: dc109e48fb07db4aa47caa912308dcee expat-2.2.0-x86_64-1_slack13.1.txz
Slackware 13.37 package: a7893a356510073d213e08e6df41be6b expat-2.2.0-i486-1_slack13.37.txz
Slackware x86_64 13.37 package: 31f42e6ef7be259413659497f473b499 expat-2.2.0-x86_64-1_slack13.37.txz
Slackware 14.0 package: 3d5ab68ef82db833aa1b890372dfa789 expat-2.2.0-i486-1_slack14.0.txz
Slackware x86_64 14.0 package: 7ab4d2d05f4695904a4e164f6093ea38 expat-2.2.0-x86_64-1_slack14.0.txz
Slackware 14.1 package: 3e9c111a338efb49ed9aa85322e7dfed expat-2.2.0-i486-1_slack14.1.txz
Slackware x86_64 14.1 package: 5ec656840cad0813deeb632ef659d97b expat-2.2.0-x86_64-1_slack14.1.txz
Slackware 14.2 package: 770d5c370a923d7f1356bc81ceaaa3e9 expat-2.2.0-i586-1_slack14.2.txz
Slackware x86_64 14.2 package: 0b44169d48b17e181cddd25c547a0258 expat-2.2.0-x86_64-1_slack14.2.txz
Slackware -current package: bc2d54deb510e5a41845207133fc1a75 l/expat-2.2.0-i586-1.txz
Slackware x86_64 -current package: 4bf858ad9d41159ce9fe624e47d58f21 l/expat-2.2.0-x86_64-1.txz
Installation instructions: +------------------------+
Upgrade the package as root:
upgradepkg expat-2.2.0-i586-1_slack14.2.txz
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. Updated to the latest 2.7.x release. These issues were addressed by updating SQLite to version 3.15.2. These issues were addressed by updating expat to version 2.2.0.
Gentoo Linux Security Advisory GLSA 201701-21
https://security.gentoo.org/
Severity: Normal Title: Expat: Multiple vulnerabilities Date: January 11, 2017 Bugs: #458742, #555642, #577928, #583268, #585510 ID: 201701-21
Synopsis
Multiple vulnerabilities have been found in Expat, the worst of which may allow execution of arbitrary code.
Background
Expat is a set of XML parsing libraries.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-libs/expat < 2.2.0-r1 >= 2.2.0-r1
Description
Multiple vulnerabilities have been discovered in Expat. Please review the CVE identifiers referenced below for details. This attack could also be used against automated systems that arbitrarily process XML files.
Workaround
There is no known workaround at this time.
Resolution
All Expat users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/expat-2.2.0-r1"
References
[ 1 ] CVE-2012-6702 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6702 [ 2 ] CVE-2013-0340 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0340 [ 3 ] CVE-2015-1283 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1283 [ 4 ] CVE-2016-0718 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0718 [ 5 ] CVE-2016-4472 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4472 [ 6 ] CVE-2016-5300 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5300
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201701-21
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-3582-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso May 18, 2016 https://www.debian.org/security/faq
Package : expat CVE ID : CVE-2016-0718
Gustavo Grieco discovered that Expat, an XML parsing C library, does not properly handle certain kinds of malformed input documents, resulting in buffer overflows during processing and error reporting.
For the stable distribution (jessie), this problem has been fixed in version 2.1.0-6+deb8u2. Additionally this update refreshes the fix for CVE-2015-1283 to avoid relying on undefined behavior.
We recommend that you upgrade your expat packages
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201605-0145", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux enterprise server", "scope": "eq", "trust": 1.8, "vendor": "suse", "version": "12" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.8, "vendor": "suse", "version": "12" }, { "model": "leap", "scope": "eq", "trust": 1.8, "vendor": "opensuse", "version": "42.1" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 1.8, "vendor": "suse", "version": "12" }, { "model": "studio onsite", "scope": "eq", "trust": 1.8, "vendor": "suse", "version": "1.3" }, { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "debian", "version": "8.0" }, { "model": "python", "scope": "lt", "trust": 1.0, "vendor": "python", "version": "2.7.15" }, { "model": "python", "scope": "lt", "trust": 1.0, "vendor": "python", "version": "3.6.2" }, { "model": "firefox", "scope": "lt", "trust": 1.0, "vendor": "mozilla", "version": "48.0" }, { "model": "python", "scope": "lt", "trust": 1.0, "vendor": "python", "version": "3.4.7" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "mac os x", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "10.11.0" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "13.1" }, { "model": "python", "scope": "gte", "trust": 1.0, "vendor": "python", "version": "3.3.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "linux enterprise debuginfo", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "python", "scope": "gte", "trust": 1.0, "vendor": "python", "version": "3.4.0" }, { "model": "policy auditor", "scope": "lt", "trust": 1.0, "vendor": "mcafee", "version": "6.5.1" }, { "model": "python", "scope": "gte", "trust": 1.0, "vendor": "python", "version": "3.5.0" }, { "model": "python", "scope": "gte", "trust": 1.0, "vendor": "python", "version": "3.6.0" }, { "model": "libexpat", "scope": "lt", "trust": 1.0, "vendor": "libexpat", "version": "2.2.0" }, { "model": "python", "scope": "lt", "trust": 1.0, "vendor": "python", "version": "3.3.7" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "mac os x", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.11.5" }, { "model": "python", "scope": "lt", "trust": 1.0, "vendor": "python", "version": "3.5.4" }, { "model": "python", "scope": "gte", "trust": 1.0, "vendor": "python", "version": "2.7.0" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "13.2" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 0.8, "vendor": "suse", "version": "11-sp4" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.8, "vendor": "suse", "version": "12-sp1" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.11.6" }, { "model": "ubuntu", "scope": "eq", "trust": 0.8, "vendor": "canonical", "version": "12.04 lts" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.8, "vendor": "suse", "version": "12-sp1" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.8, "vendor": "suse", "version": "11-sp4" }, { "model": "ubuntu", "scope": "eq", "trust": 0.8, "vendor": "canonical", "version": "16.04 lts" }, { "model": "linux enterprise debuginfo", "scope": "eq", "trust": 0.8, "vendor": "suse", "version": "11-sp4" }, { "model": "expat", "scope": null, "trust": 0.8, "vendor": "expat", "version": null }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 0.8, "vendor": "suse", "version": "12-sp1" }, { "model": "ubuntu", "scope": "eq", "trust": 0.8, "vendor": "canonical", "version": "15.10" }, { "model": "ubuntu", "scope": "eq", "trust": 0.8, "vendor": "canonical", "version": "14.04 lts" }, { "model": "mac os x", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "10.11" }, { "model": "gnu/linux", "scope": "eq", "trust": 0.8, "vendor": "debian", "version": "8.0" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "db": "CNNVD", "id": "CNNVD-201605-455" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "48.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.11.5", "versionStartIncluding": "10.11.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.5.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.6.2", "versionStartIncluding": "3.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.5.4", "versionStartIncluding": "3.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.4.7", "versionStartIncluding": "3.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.3.7", "versionStartIncluding": "3.3.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.7.15", "versionStartIncluding": "2.7.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-0718" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gustavo Grieco", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-455" } ], "trust": 0.6 }, "cve": "CVE-2016-0718", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2016-0718", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-88228", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-0718", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-0718", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-201605-455", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-88228", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-0718", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-88228" }, { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "db": "CNNVD", "id": "CNNVD-201605-455" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow. There is a security hole in Expat. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update\nAdvisory ID: RHSA-2018:2486-01\nProduct: Red Hat JBoss Core Services\nAdvisory URL: https://access.redhat.com/errata/RHSA-2018:2486\nIssue date: 2018-08-16\nCVE Names: CVE-2016-0718 CVE-2016-7167 CVE-2016-8615\n CVE-2016-8616 CVE-2016-8617 CVE-2016-8618\n CVE-2016-8619 CVE-2016-8621 CVE-2016-8622\n CVE-2016-8623 CVE-2016-8624 CVE-2016-8625\n CVE-2016-9598 CVE-2017-6004 CVE-2017-7186\n CVE-2017-7244 CVE-2017-7245 CVE-2017-7246\n CVE-2017-1000254 CVE-2017-1000257 CVE-2018-0500\n====================================================================\n1. Summary:\n\nRed Hat JBoss Core Services Pack Apache Server 2.4.29 packages for\nMicrosoft Windows and Oracle Solaris are now available. \n\nRed Hat Product Security has rated this release as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Description:\n\nThis release adds the new Apache HTTP Server 2.4.29 packages that are part\nof the JBoss Core Services offering. \n\nThis release serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.23, and includes bug fixes and enhancements. Refer\nto the Release Notes for information on the most significant bug fixes,\nenhancements and component upgrades included in this release. \n\nSecurity Fix(es):\n\n* expat: Out-of-bounds heap read on crafted input causing crash\n(CVE-2016-0718)\n* curl: escape and unescape integer overflows (CVE-2016-7167)\n* curl: Cookie injection for other servers (CVE-2016-8615)\n* curl: Case insensitive password comparison (CVE-2016-8616)\n* curl: Out-of-bounds write via unchecked multiplication (CVE-2016-8617)\n* curl: Double-free in curl_maprintf (CVE-2016-8618)\n* curl: Double-free in krb5 code (CVE-2016-8619)\n* curl: curl_getdate out-of-bounds read (CVE-2016-8621)\n* curl: URL unescape heap overflow via integer truncation (CVE-2016-8622)\n* curl: Use-after-free via shared cookies (CVE-2016-8623)\n* curl: Invalid URL parsing with \u0027#\u0027 (CVE-2016-8624)\n* curl: IDNA 2003 makes curl use wrong host (CVE-2016-8625)\n* libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS)\n(CVE-2016-9598)\n* pcre: Out-of-bounds read in compile_bracket_matchingpath function\n(8.41/3) (CVE-2017-6004)\n* pcre: Invalid Unicode property lookup (8.41/7, 10.24/2) (CVE-2017-7186)\n* pcre: invalid memory read in_pcre32_xclass (pcre_xclass.c)\n(CVE-2017-7244)\n* pcre: stack-based buffer overflow write in pcre32_copy_substring\n(CVE-2017-7245)\n* pcre: stack-based buffer overflow write in pcre32_copy_substring\n(CVE-2017-7246)\n* curl: FTP PWD response parser out of bounds read (CVE-2017-1000254)\n* curl: IMAP FETCH response out of bounds read (CVE-2017-1000257)\n* curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading\ndata over SMTP (CVE-2018-0500)\n\nDetails around this issue, including information about the CVE, severity of\nthe issue, and the CVSS score can be found on the CVE page listed in the\nReference section below. \n\nThe following packages have been upgraded to a newer upstream version:\n* Curl (7.57.0)\n* OpenSSL (1.0.2n)\n* Expat (2.2.5)\n* PCRE (8.41)\n* libxml2 (2.9.7)\n\nAcknowledgements:\n\nCVE-2017-1000254: Red Hat would like to thank Daniel Stenberg for reporting\nthis issue. \nUpstream acknowledges Max Dymond as the original reporter. \nCVE-2017-1000257: Red Hat would like to thank the Curl project for\nreporting this issue. Upstream acknowledges Brian Carpenter, (the OSS-Fuzz\nproject) as the original reporter. \nCVE-2018-0500: Red Hat would like to thank the Curl project for reporting\nthis issue. \n\n3. Solution:\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Core Services installation (including all\napplications and configuration files). \n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1296102 - CVE-2016-0718 expat: Out-of-bounds heap read on crafted input causing crash\n1375906 - CVE-2016-7167 curl: escape and unescape integer overflows\n1388370 - CVE-2016-8615 curl: Cookie injection for other servers\n1388371 - CVE-2016-8616 curl: Case insensitive password comparison\n1388377 - CVE-2016-8617 curl: Out-of-bounds write via unchecked multiplication\n1388378 - CVE-2016-8618 curl: Double-free in curl_maprintf\n1388379 - CVE-2016-8619 curl: Double-free in krb5 code\n1388385 - CVE-2016-8621 curl: curl_getdate out-of-bounds read\n1388386 - CVE-2016-8622 curl: URL unescape heap overflow via integer truncation\n1388388 - CVE-2016-8623 curl: Use-after-free via shared cookies\n1388390 - CVE-2016-8624 curl: Invalid URL parsing with \u0027#\u0027\n1388392 - CVE-2016-8625 curl: IDNA 2003 makes curl use wrong host\n1408306 - CVE-2016-9598 libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS)\n1425365 - CVE-2017-6004 pcre: Out-of-bounds read in compile_bracket_matchingpath function (8.41/3)\n1434504 - CVE-2017-7186 pcre: Invalid Unicode property lookup (8.41/7, 10.24/2)\n1437364 - CVE-2017-7244 pcre: invalid memory read in _pcre32_xclass (pcre_xclass.c)\n1437367 - CVE-2017-7245 pcre: stack-based buffer overflow write in pcre32_copy_substring\n1437369 - CVE-2017-7246 pcre: stack-based buffer overflow write in pcre32_copy_substring\n1495541 - CVE-2017-1000254 curl: FTP PWD response parser out of bounds read\n1503705 - CVE-2017-1000257 curl: IMAP FETCH response out of bounds read\n1597101 - CVE-2018-0500 curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP\n\n5. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-0718\nhttps://access.redhat.com/security/cve/CVE-2016-7167\nhttps://access.redhat.com/security/cve/CVE-2016-8615\nhttps://access.redhat.com/security/cve/CVE-2016-8616\nhttps://access.redhat.com/security/cve/CVE-2016-8617\nhttps://access.redhat.com/security/cve/CVE-2016-8618\nhttps://access.redhat.com/security/cve/CVE-2016-8619\nhttps://access.redhat.com/security/cve/CVE-2016-8621\nhttps://access.redhat.com/security/cve/CVE-2016-8622\nhttps://access.redhat.com/security/cve/CVE-2016-8623\nhttps://access.redhat.com/security/cve/CVE-2016-8624\nhttps://access.redhat.com/security/cve/CVE-2016-8625\nhttps://access.redhat.com/security/cve/CVE-2016-9598\nhttps://access.redhat.com/security/cve/CVE-2017-6004\nhttps://access.redhat.com/security/cve/CVE-2017-7186\nhttps://access.redhat.com/security/cve/CVE-2017-7244\nhttps://access.redhat.com/security/cve/CVE-2017-7245\nhttps://access.redhat.com/security/cve/CVE-2017-7246\nhttps://access.redhat.com/security/cve/CVE-2017-1000254\nhttps://access.redhat.com/security/cve/CVE-2017-1000257\nhttps://access.redhat.com/security/cve/CVE-2018-0500\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/html-single/red_hat_jboss_core_services_apache_http_server_2.4.29_release_notes/\n\n6. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\noPmWeYAK/SE=5slr\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. From: Marc Deslauriers \u003cmarc.deslauriers@canonical.com\u003e\nReply-To: Ubuntu Security \u003csecurity@ubuntu.com\u003e\nTo: ubuntu-security-announce@lists.ubuntu.com\nMessage-ID: \u003c57683228.8060901@canonical.com\u003e\nSubject: [USN-3013-1] XML-RPC for C and C++ vulnerabilities\n\n\n\n\n============================================================================\nUbuntu Security Notice USN-3013-1\nJune 20, 2016\n\nxmlrpc-c vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in XML-RPC for C and C++. \n\nSoftware Description:\n- xmlrpc-c: Lightweight RPC library based on XML and HTTP\n\nDetails:\n\nIt was discovered that the Expat code in XML-RPC for C and C++ unexpectedly\ncalled srand in certain circumstances. This could reduce the security of\ncalling applications. (CVE-2012-6702)\n\nIt was discovered that the Expat code in XML-RPC for C and C++ incorrectly\nhandled seeding the random number generator. A remote attacker could\npossibly use this issue to cause a denial of service. (CVE-2016-5300)\n\nGustavo Grieco discovered that the Expat code in XML-RPC for C and C++\nincorrectly handled malformed XML data. (CVE-2016-0718)\n\nIt was discovered that the Expat code in XML-RPC for C and C++ incorrectly\nhandled malformed XML data. \n(CVE-2015-1283, CVE-2016-4472)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 LTS:\n libxmlrpc-c++4 1.16.33-3.1ubuntu5.2\n libxmlrpc-core-c3 1.16.33-3.1ubuntu5.2\n\nAfter a standard system upgrade you need to restart any applications linked\nagainst XML-RPC for C and C++ to effect the necessary changes. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n[slackware-security] expat (SSA:2016-359-01)\n\nNew expat packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,\n14.2, and -current to fix security issues. \n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n+--------------------------+\npatches/packages/expat-2.2.0-i586-1_slack14.2.txz: Upgraded. \n This update fixes bugs and security issues:\n Multiple integer overflows in XML_GetBuffer. \n Fix crash on malformed input. \n Improve insufficient fix to CVE-2015-1283 / CVE-2015-2716. \n Use more entropy for hash initialization. \n Resolve troublesome internal call to srand. \n For more information, see:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1283\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702\n (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/expat-2.2.0-i486-1_slack13.0.txz\n\nUpdated package for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/expat-2.2.0-x86_64-1_slack13.0.txz\n\nUpdated package for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/expat-2.2.0-i486-1_slack13.1.txz\n\nUpdated package for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/expat-2.2.0-x86_64-1_slack13.1.txz\n\nUpdated package for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/expat-2.2.0-i486-1_slack13.37.txz\n\nUpdated package for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/expat-2.2.0-x86_64-1_slack13.37.txz\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/expat-2.2.0-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/expat-2.2.0-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/expat-2.2.0-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/expat-2.2.0-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/expat-2.2.0-i586-1_slack14.2.txz\n\nUpdated package for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/expat-2.2.0-x86_64-1_slack14.2.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/expat-2.2.0-i586-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/expat-2.2.0-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 package:\nd042603604cda3dedb7a75cb049071c8 expat-2.2.0-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 package:\n4c57af80cc3ccd277a365f8053dabd9b expat-2.2.0-x86_64-1_slack13.0.txz\n\nSlackware 13.1 package:\n649682e89895159e90c0775f056a5b2a expat-2.2.0-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 package:\ndc109e48fb07db4aa47caa912308dcee expat-2.2.0-x86_64-1_slack13.1.txz\n\nSlackware 13.37 package:\na7893a356510073d213e08e6df41be6b expat-2.2.0-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 package:\n31f42e6ef7be259413659497f473b499 expat-2.2.0-x86_64-1_slack13.37.txz\n\nSlackware 14.0 package:\n3d5ab68ef82db833aa1b890372dfa789 expat-2.2.0-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n7ab4d2d05f4695904a4e164f6093ea38 expat-2.2.0-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\n3e9c111a338efb49ed9aa85322e7dfed expat-2.2.0-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\n5ec656840cad0813deeb632ef659d97b expat-2.2.0-x86_64-1_slack14.1.txz\n\nSlackware 14.2 package:\n770d5c370a923d7f1356bc81ceaaa3e9 expat-2.2.0-i586-1_slack14.2.txz\n\nSlackware x86_64 14.2 package:\n0b44169d48b17e181cddd25c547a0258 expat-2.2.0-x86_64-1_slack14.2.txz\n\nSlackware -current package:\nbc2d54deb510e5a41845207133fc1a75 l/expat-2.2.0-i586-1.txz\n\nSlackware x86_64 -current package:\n4bf858ad9d41159ce9fe624e47d58f21 l/expat-2.2.0-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg expat-2.2.0-i586-1_slack14.2.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list: |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message: |\n| |\n| unsubscribe slackware-security |\n| |\n| You will get a confirmation message back containing instructions to |\n| complete the process. Please do not reply to this email address. \n Updated to the latest 2.7.x release. These issues were\naddressed by updating SQLite to version 3.15.2. These issues were\naddressed by updating expat to version 2.2.0. \n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201701-21\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Expat: Multiple vulnerabilities\n Date: January 11, 2017\n Bugs: #458742, #555642, #577928, #583268, #585510\n ID: 201701-21\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Expat, the worst of which\nmay allow execution of arbitrary code. \n\nBackground\n==========\n\nExpat is a set of XML parsing libraries. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 dev-libs/expat \u003c 2.2.0-r1 \u003e= 2.2.0-r1\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Expat. Please review\nthe CVE identifiers referenced below for details. This attack could also\nbe used against automated systems that arbitrarily process XML files. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Expat users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-libs/expat-2.2.0-r1\"\n\nReferences\n==========\n\n[ 1 ] CVE-2012-6702\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6702\n[ 2 ] CVE-2013-0340\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0340\n[ 3 ] CVE-2015-1283\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1283\n[ 4 ] CVE-2016-0718\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0718\n[ 5 ] CVE-2016-4472\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4472\n[ 6 ] CVE-2016-5300\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5300\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201701-21\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2017 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3582-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nMay 18, 2016 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : expat\nCVE ID : CVE-2016-0718\n\nGustavo Grieco discovered that Expat, an XML parsing C library, does not\nproperly handle certain kinds of malformed input documents, resulting in\nbuffer overflows during processing and error reporting. \n\nFor the stable distribution (jessie), this problem has been fixed in\nversion 2.1.0-6+deb8u2. Additionally this update refreshes the fix for\nCVE-2015-1283 to avoid relying on undefined behavior. \n\nWe recommend that you upgrade your expat packages", "sources": [ { "db": "NVD", "id": "CVE-2016-0718" }, { "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "db": "VULHUB", "id": "VHN-88228" }, { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "PACKETSTORM", "id": "148973" }, { "db": "PACKETSTORM", "id": "137544" }, { "db": "PACKETSTORM", "id": "140275" }, { "db": "PACKETSTORM", "id": "147507" }, { "db": "PACKETSTORM", "id": "141796" }, { "db": "PACKETSTORM", "id": "140431" }, { "db": "PACKETSTORM", "id": "137108" }, { "db": "PACKETSTORM", "id": "137109" } ], "trust": 2.52 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-88228", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-88228" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-0718", "trust": 3.4 }, { "db": "SECTRACK", "id": "1036348", "trust": 1.8 }, { "db": "SECTRACK", "id": "1037705", "trust": 1.8 }, { "db": "SECTRACK", "id": "1036415", "trust": 1.8 }, { "db": "PACKETSTORM", "id": "141350", "trust": 1.8 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2016/05/17/12", "trust": 1.8 }, { "db": "TENABLE", "id": "TNS-2016-20", "trust": 1.8 }, { "db": "MCAFEE", "id": "SB10365", "trust": 1.8 }, { "db": "BID", "id": "90729", "trust": 1.8 }, { "db": "JVN", "id": "JVNVU94844193", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2016-002931", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201605-455", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.0699", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2593", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "137109", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "137108", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "148973", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "139908", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "138181", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-88228", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-0718", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137544", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "140275", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147507", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "141796", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "140431", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-88228" }, { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "db": "PACKETSTORM", "id": "148973" }, { "db": "PACKETSTORM", "id": "137544" }, { "db": "PACKETSTORM", "id": "140275" }, { "db": "PACKETSTORM", "id": "147507" }, { "db": "PACKETSTORM", "id": "141796" }, { "db": "PACKETSTORM", "id": "140431" }, { "db": "PACKETSTORM", "id": "137108" }, { "db": "PACKETSTORM", "id": "137109" }, { "db": "CNNVD", "id": "CNNVD-201605-455" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "id": "VAR-201605-0145", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-88228" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T19:25:17.908000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2016-07-18-1 OS X El Capitan v10.11.6 and Security Update 2016-004", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2016/jul/msg00000.html" }, { "title": "HT206903", "trust": 0.8, "url": "https://support.apple.com/en-us/ht206903" }, { "title": "HT206903", "trust": 0.8, "url": "https://support.apple.com/ja-jp/ht206903" }, { "title": "DSA-3582", "trust": 0.8, "url": "https://www.debian.org/security/2016/dsa-3582" }, { "title": "MFSA2016-68", "trust": 0.8, "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "title": "MFSA2016-68", "trust": 0.8, "url": "http://www.mozilla-japan.org/security/announce/2016/mfsa2016-68.html" }, { "title": "SUSE-SU-2016:1512", "trust": 0.8, "url": "https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "title": "openSUSE-SU-2016", "trust": 0.8, "url": "https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "title": "SUSE-SU-2016:1508", "trust": 0.8, "url": "https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "title": "Bug 1296102", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102#c2" }, { "title": "Expat XML Parser", "trust": 0.8, "url": "https://sourceforge.net/projects/expat/" }, { "title": "USN-2983-1", "trust": 0.8, "url": "http://www.ubuntu.com/usn/usn-2983-1/" }, { "title": "Expat Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=61769" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2017/02/28/eset_antivirus_opens_macs_to_remote_execution_as_root/" }, { "title": "Red Hat: Moderate: expat security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20162824 - security advisory" }, { "title": "Ubuntu Security Notice: expat vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-2983-1" }, { "title": "Mozilla: Mozilla Foundation Security Advisory 2016-68", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories\u0026qid=2016-68" }, { "title": "Mozilla: Out-of-bounds read during XML parsing in Expat library", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories\u0026qid=ed80349726dbf716de7cec0c272ec473" }, { "title": "Amazon Linux AMI: ALAS-2016-775", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2016-775" }, { "title": "Ubuntu Security Notice: xmlrpc-c vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-3013-1" }, { "title": "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20182486 - security advisory" }, { "title": "Tenable Security Advisories: [R5] Nessus 6.8 Fixes Multiple Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=tns-2016-11" }, { "title": "Ubuntu Security Notice: firefox vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-3044-1" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=ac5af5dd99788925425f5747ec672707" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=5f8c525f1408011628af1792207b2099" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014November 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=29d79db4a6421689e55b5a9ce5d2aa60" }, { "title": "Tenable Security Advisories: [R3] PVS 5.2.0 Fixes Multiple Third-party Library Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=tns-2016-20" }, { "title": "Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - October 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins\u0026qid=21c0efa2643d707e2f50a501209eb75c" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=13f3551b67d913fba90df4b2c0dae0bf" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=ec6577109e640dac19a6ddb978afe82d" }, { "title": "afl-cve", "trust": 0.1, "url": "https://github.com/mrash/afl-cve " }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/google-security-researcher-finds-security-hole-in-esets-mac-antivirus/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "db": "CNNVD", "id": "CNNVD-201605-455" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-88228" }, { "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "http://www.securityfocus.com/bid/90729" }, { "trust": 1.9, "url": "https://security.gentoo.org/glsa/201701-21" }, { "trust": 1.9, "url": "https://access.redhat.com/errata/rhsa-2018:2486" }, { "trust": 1.9, "url": "http://www.ubuntu.com/usn/usn-2983-1" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1036348" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1036415" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1037705" }, { "trust": 1.8, "url": "http://seclists.org/fulldisclosure/2017/feb/68" }, { "trust": 1.8, "url": "http://lists.apple.com/archives/security-announce/2016/jul/msg00000.html" }, { "trust": 1.8, "url": "http://www.debian.org/security/2016/dsa-3582" }, { "trust": 1.8, "url": "http://rhn.redhat.com/errata/rhsa-2016-2824.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-3044-1" }, { "trust": 1.8, "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "trust": 1.8, "url": "http://packetstormsecurity.com/files/141350/eset-endpoint-antivirus-6-remote-code-execution.html" }, { "trust": 1.8, "url": "http://support.eset.com/ca6333/" }, { "trust": 1.8, "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "trust": 1.8, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "trust": 1.8, "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "trust": 1.8, "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "trust": 1.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "trust": 1.8, "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "trust": 1.8, "url": "https://support.apple.com/ht206903" }, { "trust": 1.8, "url": "https://www.tenable.com/security/tns-2016-20" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "trust": 1.7, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10365" }, { "trust": 1.0, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0718" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu94844193/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-0718" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0718" }, { "trust": 0.7, "url": "https://access.redhat.com/errata/rhsa-2016:2824" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2016-0718" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2593" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0699/" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5300" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4472" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-6702" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1283" }, { "trust": 0.2, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5300" }, { "trust": 0.2, "url": "http://slackware.com" }, { "trust": 0.2, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4472" }, { "trust": 0.2, "url": "http://osuosl.org)" }, { "trust": 0.2, "url": "http://slackware.com/gpg-key" }, { "trust": 0.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10365" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2983-1/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=53129" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8624" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8625" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8624" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7244" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9598" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-1000254" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8619" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8618" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8617" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8616" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-7245" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/html-single/red_hat_jboss_core_services_apache_http_server_2.4.29_release_notes/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7186" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8616" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8617" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8619" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7246" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-7167" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8621" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8622" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000257" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-1000257" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6004" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0500" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-0500" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8622" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7245" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000254" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-7186" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8615" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8615" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8618" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8625" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-7244" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8623" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-9598" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-7167" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8621" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8623" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-7246" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-6004" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/xmlrpc-c/1.16.33-3.1ubuntu5.2" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-3013-1" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1283" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6702" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-9233" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1061" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9233" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0876" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-9063" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1060" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0876" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9063" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-1060" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-1061" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://gpgtools.org" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3720" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6153" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3415" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3270" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6607" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3560" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3416" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3717" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3414" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-7443" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1148" }, { "trust": 0.1, "url": "https://www.apple.com/itunes/download/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1147" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0340" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0340" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6702" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5300" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1283" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-0718" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4472" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/expat/2.1.0-7ubuntu0.15.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/expat/2.0.1-7.2ubuntu1.3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/expat/2.1.0-4ubuntu1.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/expat/2.1.0-7ubuntu0.16.04.1" } ], "sources": [ { "db": "VULHUB", "id": "VHN-88228" }, { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "db": "PACKETSTORM", "id": "148973" }, { "db": "PACKETSTORM", "id": "137544" }, { "db": "PACKETSTORM", "id": "140275" }, { "db": "PACKETSTORM", "id": "147507" }, { "db": "PACKETSTORM", "id": "141796" }, { "db": "PACKETSTORM", "id": "140431" }, { "db": "PACKETSTORM", "id": "137108" }, { "db": "PACKETSTORM", "id": "137109" }, { "db": "CNNVD", "id": "CNNVD-201605-455" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-88228" }, { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "db": "PACKETSTORM", "id": "148973" }, { "db": "PACKETSTORM", "id": "137544" }, { "db": "PACKETSTORM", "id": "140275" }, { "db": "PACKETSTORM", "id": "147507" }, { "db": "PACKETSTORM", "id": "141796" }, { "db": "PACKETSTORM", "id": "140431" }, { "db": "PACKETSTORM", "id": "137108" }, { "db": "PACKETSTORM", "id": "137109" }, { "db": "CNNVD", "id": "CNNVD-201605-455" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-26T00:00:00", "db": "VULHUB", "id": "VHN-88228" }, { "date": "2016-05-26T00:00:00", "db": "VULMON", "id": "CVE-2016-0718" }, { "date": "2016-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "date": "2018-08-17T17:41:42", "db": "PACKETSTORM", "id": "148973" }, { "date": "2016-06-21T00:20:59", "db": "PACKETSTORM", "id": "137544" }, { "date": "2016-12-25T13:15:00", "db": "PACKETSTORM", "id": "140275" }, { "date": "2018-05-05T13:13:00", "db": "PACKETSTORM", "id": "147507" }, { "date": "2017-03-23T16:22:29", "db": "PACKETSTORM", "id": "141796" }, { "date": "2017-01-11T18:55:11", "db": "PACKETSTORM", "id": "140431" }, { "date": "2016-05-18T15:47:12", "db": "PACKETSTORM", "id": "137108" }, { "date": "2016-05-18T15:47:23", "db": "PACKETSTORM", "id": "137109" }, { "date": "2016-05-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-455" }, { "date": "2016-05-26T16:59:00.133000", "db": "NVD", "id": "CVE-2016-0718" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-12T00:00:00", "db": "VULHUB", "id": "VHN-88228" }, { "date": "2023-02-12T00:00:00", "db": "VULMON", "id": "CVE-2016-0718" }, { "date": "2016-09-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-002931" }, { "date": "2023-04-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-455" }, { "date": "2023-02-12T23:15:50.093000", "db": "NVD", "id": "CVE-2016-0718" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "137544" }, { "db": "PACKETSTORM", "id": "137108" }, { "db": "CNNVD", "id": "CNNVD-201605-455" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Expat Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-002931" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-455" } ], "trust": 0.6 } }
ghsa-3f8j-8ww3-q7v6
Vulnerability from github
Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
{ "affected": [], "aliases": [ "CVE-2016-0718" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-05-26T16:59:00Z", "severity": "CRITICAL" }, "details": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.", "id": "GHSA-3f8j-8ww3-q7v6", "modified": "2022-05-13T01:07:38Z", "published": "2022-05-13T01:07:38Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2016:2824" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2016-0718" }, { "type": "WEB", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201701-21" }, { "type": "WEB", "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "type": "WEB", "url": "https://support.apple.com/HT206903" }, { "type": "WEB", "url": "https://www.tenable.com/security/tns-2016-20" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2824.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2017/Feb/68" }, { "type": "WEB", "url": "http://support.eset.com/ca6333" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3582" }, { "type": "WEB", "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/90729" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1036348" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1036415" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1037705" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2983-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3044-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
rhsa-2016_2824
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for expat is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Expat is a C library for parsing XML documents.\n\nSecurity Fix(es):\n\n* An out-of-bounds read flaw was found in the way Expat processed certain input. A remote attacker could send specially crafted XML that, when parsed by an application using the Expat library, would cause that application to crash or, possibly, execute arbitrary code with the permission of the user running the application. (CVE-2016-0718)\n\nRed Hat would like to thank Gustavo Grieco for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2824", "url": "https://access.redhat.com/errata/RHSA-2016:2824" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1296102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2824.json" } ], "title": "Red Hat Security Advisory: expat security update", "tracking": { "current_release_date": "2024-11-22T10:31:59+00:00", "generator": { "date": "2024-11-22T10:31:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:2824", "initial_release_date": "2016-11-28T19:35:53+00:00", "revision_history": [ { "date": "2016-11-28T19:35:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-11-28T19:35:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:31:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.x86_64", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64", "product_id": "expat-devel-0:2.1.0-10.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=x86_64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=x86_64" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.x86_64", "product": { "name": "expat-0:2.1.0-10.el7_3.x86_64", "product_id": "expat-0:2.1.0-10.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=x86_64" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.x86_64", "product": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64", "product_id": "expat-static-0:2.1.0-10.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=x86_64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=x86_64" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.x86_64", "product": { "name": "expat-0:2.0.1-13.el6_8.x86_64", "product_id": "expat-0:2.0.1-13.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=x86_64" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.x86_64", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64", "product_id": "expat-devel-0:2.0.1-13.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.i686", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.i686", "product_id": "expat-devel-0:2.1.0-10.el7_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=i686" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=i686" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.i686", "product": { "name": "expat-0:2.1.0-10.el7_3.i686", "product_id": "expat-0:2.1.0-10.el7_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=i686" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.i686", "product": { "name": "expat-static-0:2.1.0-10.el7_3.i686", "product_id": "expat-static-0:2.1.0-10.el7_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=i686" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=i686" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.i686", "product": { "name": "expat-0:2.0.1-13.el6_8.i686", "product_id": "expat-0:2.0.1-13.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=i686" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.i686", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.i686", "product_id": "expat-devel-0:2.0.1-13.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.src", "product": { "name": "expat-0:2.1.0-10.el7_3.src", "product_id": "expat-0:2.1.0-10.el7_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=src" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.src", "product": { "name": "expat-0:2.0.1-13.el6_8.src", "product_id": "expat-0:2.0.1-13.el6_8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.ppc", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc", "product_id": "expat-devel-0:2.1.0-10.el7_3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=ppc" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=ppc" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.ppc", "product": { "name": "expat-0:2.1.0-10.el7_3.ppc", "product_id": "expat-0:2.1.0-10.el7_3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=ppc" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.ppc", "product": { "name": "expat-static-0:2.1.0-10.el7_3.ppc", "product_id": "expat-static-0:2.1.0-10.el7_3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=ppc" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=ppc" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.ppc", "product": { "name": "expat-0:2.0.1-13.el6_8.ppc", "product_id": "expat-0:2.0.1-13.el6_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=ppc" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.ppc", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc", "product_id": "expat-devel-0:2.0.1-13.el6_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.ppc64", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64", "product_id": "expat-devel-0:2.1.0-10.el7_3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=ppc64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=ppc64" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.ppc64", "product": { "name": "expat-0:2.1.0-10.el7_3.ppc64", "product_id": "expat-0:2.1.0-10.el7_3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=ppc64" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.ppc64", "product": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64", "product_id": "expat-static-0:2.1.0-10.el7_3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=ppc64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=ppc64" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.ppc64", "product": { "name": "expat-0:2.0.1-13.el6_8.ppc64", "product_id": "expat-0:2.0.1-13.el6_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=ppc64" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.ppc64", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64", "product_id": "expat-devel-0:2.0.1-13.el6_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "product_id": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=ppc64le" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=ppc64le" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.ppc64le", "product": { "name": "expat-0:2.1.0-10.el7_3.ppc64le", "product_id": "expat-0:2.1.0-10.el7_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=ppc64le" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.ppc64le", "product": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le", "product_id": "expat-static-0:2.1.0-10.el7_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.s390", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.s390", "product_id": "expat-devel-0:2.1.0-10.el7_3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=s390" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=s390" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.s390", "product": { "name": "expat-0:2.1.0-10.el7_3.s390", "product_id": "expat-0:2.1.0-10.el7_3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=s390" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.s390", "product": { "name": "expat-static-0:2.1.0-10.el7_3.s390", "product_id": "expat-static-0:2.1.0-10.el7_3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=s390" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=s390" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.s390", "product": { "name": "expat-0:2.0.1-13.el6_8.s390", "product_id": "expat-0:2.0.1-13.el6_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=s390" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.s390", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.s390", "product_id": "expat-devel-0:2.0.1-13.el6_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.s390x", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x", "product_id": "expat-devel-0:2.1.0-10.el7_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=s390x" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=s390x" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.s390x", "product": { "name": "expat-0:2.1.0-10.el7_3.s390x", "product_id": "expat-0:2.1.0-10.el7_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=s390x" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.s390x", "product": { "name": "expat-static-0:2.1.0-10.el7_3.s390x", "product_id": "expat-static-0:2.1.0-10.el7_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=s390x" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=s390x" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.s390x", "product": { "name": "expat-0:2.0.1-13.el6_8.s390x", "product_id": "expat-0:2.0.1-13.el6_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=s390x" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.s390x", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x", "product_id": "expat-devel-0:2.0.1-13.el6_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.aarch64", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64", "product_id": "expat-devel-0:2.1.0-10.el7_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=aarch64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=aarch64" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.aarch64", "product": { "name": "expat-0:2.1.0-10.el7_3.aarch64", "product_id": "expat-0:2.1.0-10.el7_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=aarch64" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.aarch64", "product": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64", "product_id": "expat-static-0:2.1.0-10.el7_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Gustavo Grieco" ] } ], "cve": "CVE-2016-0718", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1296102" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in the way Expat processed certain input. A remote attacker could send specially crafted XML that, when parsed by an application using the Expat library, would cause that application to crash or, possibly, execute arbitrary code with the permission of the user running the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: Out-of-bounds heap read on crafted input causing crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0718" }, { "category": "external", "summary": "RHBZ#1296102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0718", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718" } ], "release_date": "2016-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-11-28T19:35:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, applications using the Expat library must be restarted for the update to take effect.", "product_ids": [ "6Client-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2824" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: Out-of-bounds heap read on crafted input causing crash" } ] }
rhsa-2018_2486
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Pack Apache Server 2.4.29 packages for Microsoft Windows and Oracle Solaris are now available.\n\nRed Hat Product Security has rated this release as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.29 packages that are part\nof the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.23, and includes bug fixes and enhancements. Refer\nto the Release Notes for information on the most significant bug fixes,\nenhancements and component upgrades included in this release.\n\nSecurity Fix(es):\n\n* expat: Out-of-bounds heap read on crafted input causing crash (CVE-2016-0718)\n* curl: escape and unescape integer overflows (CVE-2016-7167)\n* curl: Cookie injection for other servers (CVE-2016-8615)\n* curl: Case insensitive password comparison (CVE-2016-8616)\n* curl: Out-of-bounds write via unchecked multiplication (CVE-2016-8617)\n* curl: Double-free in curl_maprintf (CVE-2016-8618)\n* curl: Double-free in krb5 code (CVE-2016-8619)\n* curl: curl_getdate out-of-bounds read (CVE-2016-8621)\n* curl: URL unescape heap overflow via integer truncation (CVE-2016-8622)\n* curl: Use-after-free via shared cookies (CVE-2016-8623)\n* curl: Invalid URL parsing with \u0027#\u0027 (CVE-2016-8624)\n* curl: IDNA 2003 makes curl use wrong host (CVE-2016-8625)\n* libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS) (CVE-2016-9598)\n* pcre: Out-of-bounds read in compile_bracket_matchingpath function (8.41/3) (CVE-2017-6004)\n* pcre: Invalid Unicode property lookup (8.41/7, 10.24/2) (CVE-2017-7186)\n* pcre: invalid memory read in_pcre32_xclass (pcre_xclass.c) (CVE-2017-7244)\n* pcre: stack-based buffer overflow write in pcre32_copy_substring (CVE-2017-7245)\n* pcre: stack-based buffer overflow write in pcre32_copy_substring (CVE-2017-7246)\n* curl: FTP PWD response parser out of bounds read (CVE-2017-1000254)\n* curl: IMAP FETCH response out of bounds read (CVE-2017-1000257)\n* curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP (CVE-2018-0500)\n\nDetails around this issue, including information about the CVE, severity of\nthe issue, and the CVSS score can be found on the CVE page listed in the\nReference section below.\n\nThe following packages have been upgraded to a newer upstream version:\n* Curl (7.57.0)\n* OpenSSL (1.0.2n)\n* Expat (2.2.5)\n* PCRE (8.41)\n* libxml2 (2.9.7)\n\nAcknowledgements:\n\nCVE-2017-1000254: Red Hat would like to thank Daniel Stenberg for reporting this issue.\nUpstream acknowledges Max Dymond as the original reporter.\nCVE-2017-1000257: Red Hat would like to thank the Curl project for reporting this issue. Upstream acknowledges Brian Carpenter, (the OSS-Fuzz project) as the original reporter.\nCVE-2018-0500: Red Hat would like to thank the Curl project for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2486", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/html-single/red_hat_jboss_core_services_apache_http_server_2.4.29_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/html-single/red_hat_jboss_core_services_apache_http_server_2.4.29_release_notes/" }, { "category": "external", "summary": "1296102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "category": "external", "summary": "1375906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375906" }, { "category": "external", "summary": "1388370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388370" }, { "category": "external", "summary": "1388371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388371" }, { "category": "external", "summary": "1388377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388377" }, { "category": "external", "summary": "1388378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388378" }, { "category": "external", "summary": "1388379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388379" }, { "category": "external", "summary": "1388385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388385" }, { "category": "external", "summary": "1388386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388386" }, { "category": "external", "summary": "1388388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388388" }, { "category": "external", "summary": "1388390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388390" }, { "category": "external", "summary": "1388392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388392" }, { "category": "external", "summary": "1408306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408306" }, { "category": "external", "summary": "1425365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425365" }, { "category": "external", "summary": "1434504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1434504" }, { "category": "external", "summary": "1437364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437364" }, { "category": "external", "summary": "1437367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437367" }, { "category": "external", "summary": "1437369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437369" }, { "category": "external", "summary": "1495541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495541" }, { "category": "external", "summary": "1503705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503705" }, { "category": "external", "summary": "1597101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597101" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2486.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update", "tracking": { "current_release_date": "2024-11-22T12:14:14+00:00", "generator": { "date": "2024-11-22T12:14:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:2486", "initial_release_date": "2018-08-16T16:06:16+00:00", "revision_history": [ { "date": "2018-08-16T16:06:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-16T16:06:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T12:14:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services 1", "product": { "name": "Red Hat JBoss Core Services 1", "product_id": "Red Hat JBoss Core Services 1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Gustavo Grieco" ] } ], "cve": "CVE-2016-0718", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1296102" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in the way Expat processed certain input. A remote attacker could send specially crafted XML that, when parsed by an application using the Expat library, would cause that application to crash or, possibly, execute arbitrary code with the permission of the user running the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: Out-of-bounds heap read on crafted input causing crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0718" }, { "category": "external", "summary": "RHBZ#1296102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0718", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718" } ], "release_date": "2016-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: Out-of-bounds heap read on crafted input causing crash" }, { "cve": "CVE-2016-4975", "cwe": { "id": "CWE-113", "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)" }, "discovery_date": "2016-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375968" } ], "notes": [ { "category": "description", "text": "It was found that Apache was vulnerable to a HTTP response splitting attack for sites which use mod_userdir. An attacker could use this flaw to inject CRLF characters into the HTTP header and could possibly gain access to secure data.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4975" }, { "category": "external", "summary": "RHBZ#1375968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375968" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4975", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4975" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4975", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4975" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975", "url": "https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir" }, { "cve": "CVE-2016-5131", "discovery_date": "2016-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1358641" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use after free triggered by XPointer paths beginning with range-to", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw in libxml2 requires exposing the library to XPath/XPointer expressions from an untrusted source, which is not common in practice for applications using libxml2. For libxml2, Red Hat Product Security has rated this vulnerability as Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5131" }, { "category": "external", "summary": "RHBZ#1358641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5131", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5131" }, { "category": "external", "summary": "https://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "url": "https://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" } ], "release_date": "2016-07-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "libxml2: Use after free triggered by XPointer paths beginning with range-to" }, { "cve": "CVE-2016-7167", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2016-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375906" } ], "notes": [ { "category": "description", "text": "Multiple integer overflow flaws leading to heap-based buffer overflows were found in the way curl handled escaping and unescaping of data. An attacker could potentially use these flaws to crash an application using libcurl by sending a specially crafted input to the affected libcurl functions.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: escape and unescape integer overflows", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7167" }, { "category": "external", "summary": "RHBZ#1375906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375906" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7167", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7167" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7167", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7167" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20160914.html", "url": "https://curl.haxx.se/docs/adv_20160914.html" } ], "release_date": "2016-09-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: escape and unescape integer overflows" }, { "cve": "CVE-2016-8615", "cwe": { "id": "CWE-99", "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388370" } ], "notes": [ { "category": "description", "text": "A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Cookie injection for other servers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8615" }, { "category": "external", "summary": "RHBZ#1388370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388370" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8615", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8615" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8615", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8615" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102A.html", "url": "https://curl.haxx.se/docs/adv_20161102A.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Cookie injection for other servers" }, { "cve": "CVE-2016-8616", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388371" } ], "notes": [ { "category": "description", "text": "A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Case insensitive password comparison", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8616" }, { "category": "external", "summary": "RHBZ#1388371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8616", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8616" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8616", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8616" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102B.html", "url": "https://curl.haxx.se/docs/adv_20161102B.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: Case insensitive password comparison" }, { "cve": "CVE-2016-8617", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388377" } ], "notes": [ { "category": "description", "text": "The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Out-of-bounds write via unchecked multiplication", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8617" }, { "category": "external", "summary": "RHBZ#1388377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388377" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8617", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8617" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8617", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8617" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102C.html", "url": "https://curl.haxx.se/docs/adv_20161102C.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Out-of-bounds write via unchecked multiplication" }, { "cve": "CVE-2016-8618", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388378" } ], "notes": [ { "category": "description", "text": "The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Double-free in curl_maprintf", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8618" }, { "category": "external", "summary": "RHBZ#1388378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388378" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8618", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8618" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8618", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8618" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102D.html", "url": "https://curl.haxx.se/docs/adv_20161102D.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Double-free in curl_maprintf" }, { "cve": "CVE-2016-8619", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388379" } ], "notes": [ { "category": "description", "text": "The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Double-free in krb5 code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8619" }, { "category": "external", "summary": "RHBZ#1388379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8619", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8619" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102E.html", "url": "https://curl.haxx.se/docs/adv_20161102E.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Double-free in krb5 code" }, { "cve": "CVE-2016-8621", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388385" } ], "notes": [ { "category": "description", "text": "The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: curl_getdate out-of-bounds read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8621" }, { "category": "external", "summary": "RHBZ#1388385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388385" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8621", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8621" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8621", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8621" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102G.html", "url": "https://curl.haxx.se/docs/adv_20161102G.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: curl_getdate out-of-bounds read" }, { "cve": "CVE-2016-8622", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388386" } ], "notes": [ { "category": "description", "text": "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: URL unescape heap overflow via integer truncation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8622" }, { "category": "external", "summary": "RHBZ#1388386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8622", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8622" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8622", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8622" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102H.html", "url": "https://curl.haxx.se/docs/adv_20161102H.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: URL unescape heap overflow via integer truncation" }, { "cve": "CVE-2016-8623", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388388" } ], "notes": [ { "category": "description", "text": "A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Use-after-free via shared cookies", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8623" }, { "category": "external", "summary": "RHBZ#1388388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8623", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8623" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102I.html", "url": "https://curl.haxx.se/docs/adv_20161102I.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: Use-after-free via shared cookies" }, { "cve": "CVE-2016-8624", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388390" } ], "notes": [ { "category": "description", "text": "curl before version 7.51.0 doesn\u0027t parse the authority component of the URL correctly when the host name part ends with a \u0027#\u0027 character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Invalid URL parsing with \u0027#\u0027", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8624" }, { "category": "external", "summary": "RHBZ#1388390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388390" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8624", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8624" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8624", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8624" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102J.html", "url": "https://curl.haxx.se/docs/adv_20161102J.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Invalid URL parsing with \u0027#\u0027" }, { "cve": "CVE-2016-8625", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388392" } ], "notes": [ { "category": "description", "text": "curl before version 7.51.0 uses outdated IDNA 2003 standard to handle International Domain Names and this may lead users to potentially and unknowingly issue network transfer requests to the wrong host.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: IDNA 2003 makes curl use wrong host", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8625" }, { "category": "external", "summary": "RHBZ#1388392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388392" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8625", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8625" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102K.html", "url": "https://curl.haxx.se/docs/adv_20161102K.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: IDNA 2003 makes curl use wrong host" }, { "cve": "CVE-2016-9318", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2016-11-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1395609" } ], "notes": [ { "category": "description", "text": "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: XML External Entity vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-9318" }, { "category": "external", "summary": "RHBZ#1395609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395609" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9318", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9318" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9318", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9318" } ], "release_date": "2016-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "category": "workaround", "details": "Application parsing untrusted input with libxml2 should be careful to NOT use entity expansion (enabled by XML_PARSE_NOENT) or DTD validation (XML_PARSE_DTDLOAD, XML_PARSE_DTDVALID) on such input.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: XML External Entity vulnerability" }, { "cve": "CVE-2016-9596", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1408302" } ], "notes": [ { "category": "description", "text": "libxml2, as used in Red Hat JBoss Core Services and when in recovery mode, allows context-dependent attackers to cause a denial of service (stack consumption) via a crafted XML document. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-3627.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: stack exhaustion while parsing xml files in recovery mode (unfixed CVE-2016-3627 in JBCS)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-9596" }, { "category": "external", "summary": "RHBZ#1408302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408302" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9596", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9596" } ], "release_date": "2016-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: stack exhaustion while parsing xml files in recovery mode (unfixed CVE-2016-3627 in JBCS)" }, { "cve": "CVE-2016-9597", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1408305" } ], "notes": [ { "category": "description", "text": "It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: stack overflow before detecting invalid XML file (unfixed CVE-2016-3705 in JBCS)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-9597" }, { "category": "external", "summary": "RHBZ#1408305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9597", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9597" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9597", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9597" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: stack overflow before detecting invalid XML file (unfixed CVE-2016-3705 in JBCS)" }, { "cve": "CVE-2016-9598", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-05-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1408306" } ], "notes": [ { "category": "description", "text": "libxml2, as used in Red Hat JBoss Core Services, allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted XML document. NOTE: this vulnerability exists because of a missing fix for CVE-2016-4483.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-9598" }, { "category": "external", "summary": "RHBZ#1408306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408306" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9598", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9598" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS)" }, { "cve": "CVE-2017-6004", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1425365" } ], "notes": [ { "category": "description", "text": "The compile_bracket_matchingpath function in pcre_jit_compile.c in PCRE through 8.x before revision 1680 (e.g., the PHP 7.1.1 bundled version) allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted regular expression.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: Out-of-bounds read in compile_bracket_matchingpath function (8.41/3)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-6004" }, { "category": "external", "summary": "RHBZ#1425365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425365" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-6004", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-6004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6004" } ], "release_date": "2017-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "pcre: Out-of-bounds read in compile_bracket_matchingpath function (8.41/3)" }, { "cve": "CVE-2017-7186", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1434504" } ], "notes": [ { "category": "description", "text": "libpcre1 in PCRE 8.40 and libpcre2 in PCRE2 10.23 allow remote attackers to cause a denial of service (segmentation violation for read access, and application crash) by triggering an invalid Unicode property lookup.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: Invalid Unicode property lookup (8.41/7, 10.24/2)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7186" }, { "category": "external", "summary": "RHBZ#1434504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1434504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7186", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7186" } ], "release_date": "2017-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "pcre: Invalid Unicode property lookup (8.41/7, 10.24/2)" }, { "cve": "CVE-2017-7244", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1437364" } ], "notes": [ { "category": "description", "text": "The _pcre32_xclass function in pcre_xclass.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (invalid memory read) via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: invalid memory read in _pcre32_xclass (pcre_xclass.c)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7244" }, { "category": "external", "summary": "RHBZ#1437364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437364" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7244", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7244" }, { "category": "external", "summary": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/", "url": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/" } ], "release_date": "2017-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "pcre: invalid memory read in _pcre32_xclass (pcre_xclass.c)" }, { "cve": "CVE-2017-7245", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1437367" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: stack-based buffer overflow write in pcre32_copy_substring", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7245" }, { "category": "external", "summary": "RHBZ#1437367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437367" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7245", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7245" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7245", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7245" }, { "category": "external", "summary": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/", "url": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/" } ], "release_date": "2017-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "pcre: stack-based buffer overflow write in pcre32_copy_substring" }, { "cve": "CVE-2017-7246", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1437369" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: stack-based buffer overflow write in pcre32_copy_substring", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7246" }, { "category": "external", "summary": "RHBZ#1437369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437369" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7246", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7246" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7246", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7246" }, { "category": "external", "summary": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/", "url": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/" } ], "release_date": "2017-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "pcre: stack-based buffer overflow write in pcre32_copy_substring" }, { "cve": "CVE-2017-9047", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1452554" } ], "notes": [ { "category": "description", "text": "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. The variable len is assigned strlen(buf). If the content-\u003etype is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-\u003eprefix is appended to buf (if it actually fits) whereupon (ii) content-\u003ename is written to the buffer. However, the check for whether the content-\u003ename actually fits also uses \u0027len\u0027 rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Buffer overflow in function xmlSnprintfElementContent", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability exists in the DTD validation functionality of libxml2. Applications that do not attempt to validate untrusted documents are not impacted.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9047" }, { "category": "external", "summary": "RHBZ#1452554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9047", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9047" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9047", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9047" } ], "release_date": "2017-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Buffer overflow in function xmlSnprintfElementContent" }, { "cve": "CVE-2017-9048", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2017-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1452549" } ], "notes": [ { "category": "description", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 \u003c size. This vulnerability causes programs that use libxml2, such as PHP, to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Stack-based buffer overflow in function xmlSnprintfElementContent", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability exists in the DTD validation functionality of libxml2. Applications that do not attempt to validate untrusted documents are not impacted.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9048" }, { "category": "external", "summary": "RHBZ#1452549", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452549" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9048", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9048" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9048", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9048" } ], "release_date": "2017-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libxml2: Stack-based buffer overflow in function xmlSnprintfElementContent" }, { "cve": "CVE-2017-9049", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1452556" } ], "notes": [ { "category": "description", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer over-read in function xmlDictComputeFastKey", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9049" }, { "category": "external", "summary": "RHBZ#1452556", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452556" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9049", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9049" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9049", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9049" } ], "release_date": "2017-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer over-read in function xmlDictComputeFastKey" }, { "cve": "CVE-2017-9050", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1452553" } ], "notes": [ { "category": "description", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer over-read in function xmlDictAddString", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9050" }, { "category": "external", "summary": "RHBZ#1452553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452553" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9050", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9050" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9050", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9050" } ], "release_date": "2017-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer over-read in function xmlDictAddString" }, { "cve": "CVE-2017-18258", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566749" } ], "notes": [ { "category": "description", "text": "The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Unrestricted memory usage in xz_head() function in xzlib.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-18258" }, { "category": "external", "summary": "RHBZ#1566749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-18258", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18258" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18258", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18258" } ], "release_date": "2017-09-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libxml2: Unrestricted memory usage in xz_head() function in xzlib.c" }, { "acknowledgments": [ { "names": [ "the Curl project" ] }, { "names": [ "Max Dymond" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2017-1000254", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495541" } ], "notes": [ { "category": "description", "text": "libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the `PWD` command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7), March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: FTP PWD response parser out of bounds read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000254" }, { "category": "external", "summary": "RHBZ#1495541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000254", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000254" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20171004.html", "url": "https://curl.haxx.se/docs/adv_20171004.html" } ], "release_date": "2017-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: FTP PWD response parser out of bounds read" }, { "acknowledgments": [ { "names": [ "the Curl project" ] }, { "names": [ "Brian Carpenter", "the OSS-Fuzz project" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2017-1000257", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1503705" } ], "notes": [ { "category": "description", "text": "A buffer overrun flaw was found in the IMAP handler of libcurl. By tricking an unsuspecting user into connecting to a malicious IMAP server, an attacker could exploit this flaw to potentially cause information disclosure or crash the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: IMAP FETCH response out of bounds read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000257" }, { "category": "external", "summary": "RHBZ#1503705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000257", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000257" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000257", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000257" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20171023.html", "url": "https://curl.haxx.se/docs/adv_20171023.html" } ], "release_date": "2017-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "category": "workaround", "details": "Switch off IMAP in `CURLOPT_PROTOCOLS`", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: IMAP FETCH response out of bounds read" }, { "acknowledgments": [ { "names": [ "the Curl project" ] }, { "names": [ "Peter Wu" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2018-0500", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2018-07-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1597101" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow has been found in the Curl_smtp_escape_eob() function of curl. An attacker could exploit this by convincing a user to use curl to upload data over SMTP with a reduced buffer to cause a crash or corrupt memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of curl/libcurl as shipped with Red Hat Enterprise Linux 5, 6 and 7 as they did not include the vulnerable code.\n\nThis issue did not affect the versions of curl/libcurl as shipped with Red Hat Software Collections 3 as they did not include the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0500" }, { "category": "external", "summary": "RHBZ#1597101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0500", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0500" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0500", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0500" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_2018-70a2.html", "url": "https://curl.haxx.se/docs/adv_2018-70a2.html" } ], "release_date": "2018-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-16T16:06:16+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP" } ] }
gsd-2016-0718
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2016-0718", "description": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.", "id": "GSD-2016-0718", "references": [ "https://www.suse.com/security/cve/CVE-2016-0718.html", "https://www.debian.org/security/2016/dsa-3582", "https://access.redhat.com/errata/RHSA-2018:2486", "https://access.redhat.com/errata/RHSA-2016:2824", "https://ubuntu.com/security/CVE-2016-0718", "https://advisories.mageia.org/CVE-2016-0718.html", "https://alas.aws.amazon.com/cve/html/CVE-2016-0718.html", "https://linux.oracle.com/cve/CVE-2016-0718.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-0718" ], "details": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.", "id": "GSD-2016-0718", "modified": "2023-12-13T01:21:17.573965Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-0718", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "name": "http://www.securitytracker.com/id/1036348", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1036348" }, { "name": "https://support.apple.com/HT206903", "refsource": "MISC", "url": "https://support.apple.com/HT206903" }, { "name": "https://source.android.com/security/bulletin/2016-11-01.html", "refsource": "MISC", "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "https://security.gentoo.org/glsa/201701-21", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/201701-21" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "name": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2016-2824.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-2824.html" }, { "name": "http://seclists.org/fulldisclosure/2017/Feb/68", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2017/Feb/68" }, { "name": "http://support.eset.com/ca6333/", "refsource": "MISC", "url": "http://support.eset.com/ca6333/" }, { "name": "http://www.debian.org/security/2016/dsa-3582", "refsource": "MISC", "url": "http://www.debian.org/security/2016/dsa-3582" }, { "name": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html", "refsource": "MISC", "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "name": "http://www.openwall.com/lists/oss-security/2016/05/17/12", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "name": "http://www.securityfocus.com/bid/90729", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/90729" }, { "name": "http://www.securitytracker.com/id/1036415", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1036415" }, { "name": "http://www.securitytracker.com/id/1037705", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1037705" }, { "name": "http://www.ubuntu.com/usn/USN-2983-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-2983-1" }, { "name": "http://www.ubuntu.com/usn/USN-3044-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "name": "https://access.redhat.com/errata/RHSA-2018:2486", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923", "refsource": "MISC", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365", "refsource": "MISC", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "name": "https://www.tenable.com/security/tns-2016-20", "refsource": "MISC", "url": "https://www.tenable.com/security/tns-2016-20" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "48.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.11.5", "versionStartIncluding": "10.11.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.5.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.6.2", "versionStartIncluding": "3.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.5.4", "versionStartIncluding": "3.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.4.7", "versionStartIncluding": "3.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.3.7", "versionStartIncluding": "3.3.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.7.15", "versionStartIncluding": "2.7.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-0718" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20160517 CVE-2016-0718: Expat XML Parser Crashes on Malformed Input", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "name": "DSA-3582", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3582" }, { "name": "USN-2983-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2983-1" }, { "name": "SUSE-SU-2016:1508", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "name": "SUSE-SU-2016:1512", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "name": "openSUSE-SU-2016:1523", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "name": "APPLE-SA-2016-07-18-1", "refsource": "APPLE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "name": "https://support.apple.com/HT206903", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT206903" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "name": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "name": "USN-3044-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "name": "openSUSE-SU-2016:2026", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "name": "openSUSE-SU-2016:1964", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "name": "90729", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/90729" }, { "name": "https://source.android.com/security/bulletin/2016-11-01.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "openSUSE-SU-2016:1441", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "name": "http://support.eset.com/ca6333/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.eset.com/ca6333/" }, { "name": "20170227 CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/68" }, { "name": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html" }, { "name": "GLSA-201701-21", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201701-21" }, { "name": "1037705", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037705" }, { "name": "1036415", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036415" }, { "name": "1036348", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036348" }, { "name": "https://www.tenable.com/security/tns-2016-20", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2016-20" }, { "name": "RHSA-2016:2824", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2824.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "RHSA-2018:2486", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2023-02-12T23:15Z", "publishedDate": "2016-05-26T16:59Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.