Action not permitted
Modal body text goes here.
CVE-2016-0718
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:03.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2016:2824", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2824.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.tenable.com/security/tns-2016-20" }, { "name": "1037705", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037705" }, { "name": "1036415", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036415" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "USN-2983-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2983-1" }, { "name": "openSUSE-SU-2016:1523", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.eset.com/ca6333/" }, { "name": "90729", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/90729" }, { "name": "USN-3044-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "name": "[oss-security] 20160517 CVE-2016-0718: Expat XML Parser Crashes on Malformed Input", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "name": "APPLE-SA-2016-07-18-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "name": "SUSE-SU-2016:1508", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "name": "20170227 CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/68" }, { "name": "GLSA-201701-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201701-21" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "DSA-3582", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3582" }, { "name": "SUSE-SU-2016:1512", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "name": "openSUSE-SU-2016:1964", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "name": "RHSA-2018:2486", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "1036348", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036348" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT206903" }, { "name": "openSUSE-SU-2016:1441", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "name": "openSUSE-SU-2016:2026", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-31T07:06:39", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2016:2824", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2824.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.tenable.com/security/tns-2016-20" }, { "name": "1037705", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037705" }, { "name": "1036415", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036415" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "USN-2983-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2983-1" }, { "name": "openSUSE-SU-2016:1523", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.eset.com/ca6333/" }, { "name": "90729", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/90729" }, { "name": "USN-3044-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "name": "[oss-security] 20160517 CVE-2016-0718: Expat XML Parser Crashes on Malformed Input", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "name": "APPLE-SA-2016-07-18-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "name": "SUSE-SU-2016:1508", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "name": "20170227 CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/68" }, { "name": "GLSA-201701-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201701-21" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "DSA-3582", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3582" }, { "name": "SUSE-SU-2016:1512", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "name": "openSUSE-SU-2016:1964", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "name": "RHSA-2018:2486", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "1036348", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036348" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT206903" }, { "name": "openSUSE-SU-2016:1441", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "name": "openSUSE-SU-2016:2026", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-0718", "datePublished": "2016-05-26T16:00:00", "dateReserved": "2015-12-16T00:00:00", "dateUpdated": "2024-08-05T22:30:03.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-0718\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-05-26T16:59:00.133\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.\"},{\"lang\":\"es\",\"value\":\"Expat permite a atacantes dependientes del contexto provocar una denegaci\u00f3n de servicio (ca\u00edda) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un documento de entrada mal formado, lo que desencadena un desbordamiento de buffer.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"48.0\",\"matchCriteriaId\":\"9779CA44-29CF-4995-B10E-F9239E989280\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.11.0\",\"versionEndIncluding\":\"10.11.5\",\"matchCriteriaId\":\"8FB26959-7A01-4772-9C34-8836B958CB0A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F892F1B0-514C-42F7-90AE-12ACDFDC1033\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74BCA435-7594-49E8-9BAE-9E02E129B6C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"55C5561F-BE86-4EEA-99D4-8697F8BD9DFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D41A798E-0D69-43C7-9A63-1E5921138EAC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4863BE36-D16A-4D75-90D9-FD76DB5B48B7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0BA503-3F96-48DA-AF47-FBA37A9D0C48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"15FC9014-BD85-4382-9D04-C0703E901D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2076747F-A98E-4DD9-9B52-BF1732BCAD3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"1831D45A-EE6E-4220-8F8C-248B69520948\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A633996-2FD7-467C-BAA6-529E16BD06D1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.2.0\",\"matchCriteriaId\":\"BE4EECEA-61AE-4AD0-87C2-89DC1890DDDD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10BC294-9196-425F-9FB0-B1625465B47F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03117DF1-3BEC-4B8D-AD63-DBBDB2126081\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.5.1\",\"matchCriteriaId\":\"CB739B3A-20BB-4118-82DD-7ACFE5881FE2\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.7.0\",\"versionEndExcluding\":\"2.7.15\",\"matchCriteriaId\":\"CF6ABED2-9492-42E0-80A7-AB77C2900E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.3.0\",\"versionEndExcluding\":\"3.3.7\",\"matchCriteriaId\":\"2E822AE7-709A-4DA4-B2C6-7A5968AE62FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.4.0\",\"versionEndExcluding\":\"3.4.7\",\"matchCriteriaId\":\"E65C03FE-52E0-477A-A104-8F2CC0EEE753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5.0\",\"versionEndExcluding\":\"3.5.4\",\"matchCriteriaId\":\"9C0FE3B2-27E6-4DA9-8479-B34E3014AC55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.6.0\",\"versionEndExcluding\":\"3.6.2\",\"matchCriteriaId\":\"0AAF5776-8121-49B5-A6AE-815B7CCAC307\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2824.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2017/Feb/68\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://support.eset.com/ca6333/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3582\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mozilla.org/security/announce/2016/mfsa2016-68.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/05/17/12\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/90729\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036348\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036415\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037705\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2983-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3044-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2486\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1236923\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1296102\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201701-21\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2016-11-01.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/HT206903\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2016-20\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2824.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2017/Feb/68\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://support.eset.com/ca6333/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3582\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mozilla.org/security/announce/2016/mfsa2016-68.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/05/17/12\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/90729\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036348\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036415\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2983-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3044-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2486\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1236923\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1296102\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201701-21\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2016-11-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/HT206903\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2016-20\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2016_2824
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for expat is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Expat is a C library for parsing XML documents.\n\nSecurity Fix(es):\n\n* An out-of-bounds read flaw was found in the way Expat processed certain input. A remote attacker could send specially crafted XML that, when parsed by an application using the Expat library, would cause that application to crash or, possibly, execute arbitrary code with the permission of the user running the application. (CVE-2016-0718)\n\nRed Hat would like to thank Gustavo Grieco for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2824", "url": "https://access.redhat.com/errata/RHSA-2016:2824" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1296102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2016/rhsa-2016_2824.json" } ], "title": "Red Hat Security Advisory: expat security update", "tracking": { "current_release_date": "2024-09-15T23:50:30+00:00", "generator": { "date": "2024-09-15T23:50:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2016:2824", "initial_release_date": "2016-11-28T19:35:53+00:00", "revision_history": [ { "date": "2016-11-28T19:35:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-11-28T19:35:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-15T23:50:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.x86_64", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64", "product_id": "expat-devel-0:2.1.0-10.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=x86_64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=x86_64" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.x86_64", "product": { "name": "expat-0:2.1.0-10.el7_3.x86_64", "product_id": "expat-0:2.1.0-10.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=x86_64" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.x86_64", "product": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64", "product_id": "expat-static-0:2.1.0-10.el7_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=x86_64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=x86_64" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.x86_64", "product": { "name": "expat-0:2.0.1-13.el6_8.x86_64", "product_id": "expat-0:2.0.1-13.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=x86_64" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.x86_64", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64", "product_id": "expat-devel-0:2.0.1-13.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.i686", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.i686", "product_id": "expat-devel-0:2.1.0-10.el7_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=i686" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=i686" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.i686", "product": { "name": "expat-0:2.1.0-10.el7_3.i686", "product_id": "expat-0:2.1.0-10.el7_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=i686" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.i686", "product": { "name": "expat-static-0:2.1.0-10.el7_3.i686", "product_id": "expat-static-0:2.1.0-10.el7_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=i686" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=i686" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.i686", "product": { "name": "expat-0:2.0.1-13.el6_8.i686", "product_id": "expat-0:2.0.1-13.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=i686" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.i686", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.i686", "product_id": "expat-devel-0:2.0.1-13.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.src", "product": { "name": "expat-0:2.1.0-10.el7_3.src", "product_id": "expat-0:2.1.0-10.el7_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=src" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.src", "product": { "name": "expat-0:2.0.1-13.el6_8.src", "product_id": "expat-0:2.0.1-13.el6_8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.ppc", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc", "product_id": "expat-devel-0:2.1.0-10.el7_3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=ppc" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=ppc" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.ppc", "product": { "name": "expat-0:2.1.0-10.el7_3.ppc", "product_id": "expat-0:2.1.0-10.el7_3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=ppc" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.ppc", "product": { "name": "expat-static-0:2.1.0-10.el7_3.ppc", "product_id": "expat-static-0:2.1.0-10.el7_3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=ppc" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=ppc" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.ppc", "product": { "name": "expat-0:2.0.1-13.el6_8.ppc", "product_id": "expat-0:2.0.1-13.el6_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=ppc" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.ppc", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc", "product_id": "expat-devel-0:2.0.1-13.el6_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.ppc64", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64", "product_id": "expat-devel-0:2.1.0-10.el7_3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=ppc64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=ppc64" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.ppc64", "product": { "name": "expat-0:2.1.0-10.el7_3.ppc64", "product_id": "expat-0:2.1.0-10.el7_3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=ppc64" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.ppc64", "product": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64", "product_id": "expat-static-0:2.1.0-10.el7_3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=ppc64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=ppc64" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.ppc64", "product": { "name": "expat-0:2.0.1-13.el6_8.ppc64", "product_id": "expat-0:2.0.1-13.el6_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=ppc64" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.ppc64", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64", "product_id": "expat-devel-0:2.0.1-13.el6_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "product_id": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=ppc64le" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=ppc64le" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.ppc64le", "product": { "name": "expat-0:2.1.0-10.el7_3.ppc64le", "product_id": "expat-0:2.1.0-10.el7_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=ppc64le" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.ppc64le", "product": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le", "product_id": "expat-static-0:2.1.0-10.el7_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.s390", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.s390", "product_id": "expat-devel-0:2.1.0-10.el7_3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=s390" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=s390" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.s390", "product": { "name": "expat-0:2.1.0-10.el7_3.s390", "product_id": "expat-0:2.1.0-10.el7_3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=s390" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.s390", "product": { "name": "expat-static-0:2.1.0-10.el7_3.s390", "product_id": "expat-static-0:2.1.0-10.el7_3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=s390" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=s390" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.s390", "product": { "name": "expat-0:2.0.1-13.el6_8.s390", "product_id": "expat-0:2.0.1-13.el6_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=s390" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.s390", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.s390", "product_id": "expat-devel-0:2.0.1-13.el6_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.s390x", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x", "product_id": "expat-devel-0:2.1.0-10.el7_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=s390x" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=s390x" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.s390x", "product": { "name": "expat-0:2.1.0-10.el7_3.s390x", "product_id": "expat-0:2.1.0-10.el7_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=s390x" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.s390x", "product": { "name": "expat-static-0:2.1.0-10.el7_3.s390x", "product_id": "expat-static-0:2.1.0-10.el7_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=s390x" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "product": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "product_id": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.0.1-13.el6_8?arch=s390x" } } }, { "category": "product_version", "name": "expat-0:2.0.1-13.el6_8.s390x", "product": { "name": "expat-0:2.0.1-13.el6_8.s390x", "product_id": "expat-0:2.0.1-13.el6_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.0.1-13.el6_8?arch=s390x" } } }, { "category": "product_version", "name": "expat-devel-0:2.0.1-13.el6_8.s390x", "product": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x", "product_id": "expat-devel-0:2.0.1-13.el6_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.0.1-13.el6_8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "expat-devel-0:2.1.0-10.el7_3.aarch64", "product": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64", "product_id": "expat-devel-0:2.1.0-10.el7_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-devel@2.1.0-10.el7_3?arch=aarch64" } } }, { "category": "product_version", "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "product": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "product_id": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-debuginfo@2.1.0-10.el7_3?arch=aarch64" } } }, { "category": "product_version", "name": "expat-0:2.1.0-10.el7_3.aarch64", "product": { "name": "expat-0:2.1.0-10.el7_3.aarch64", "product_id": "expat-0:2.1.0-10.el7_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat@2.1.0-10.el7_3?arch=aarch64" } } }, { "category": "product_version", "name": "expat-static-0:2.1.0-10.el7_3.aarch64", "product": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64", "product_id": "expat-static-0:2.1.0-10.el7_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/expat-static@2.1.0-10.el7_3?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.src" }, "product_reference": "expat-0:2.0.1-13.el6_8.src", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.0.1-13.el6_8.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64" }, "product_reference": "expat-devel-0:2.0.1-13.el6_8.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src" }, "product_reference": "expat-0:2.1.0-10.el7_3.src", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-devel-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-devel-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.i686", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "expat-static-0:2.1.0-10.el7_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" }, "product_reference": "expat-static-0:2.1.0-10.el7_3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Gustavo Grieco" ] } ], "cve": "CVE-2016-0718", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1296102" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in the way Expat processed certain input. A remote attacker could send specially crafted XML that, when parsed by an application using the Expat library, would cause that application to crash or, possibly, execute arbitrary code with the permission of the user running the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: Out-of-bounds heap read on crafted input causing crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0718" }, { "category": "external", "summary": "RHBZ#1296102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0718", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718" } ], "release_date": "2016-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, applications using the Expat library must be restarted for the update to take effect.", "product_ids": [ "6Client-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2824" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Client-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Client-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.src", "6ComputeNode-optional-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6ComputeNode-optional-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Server-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Server-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.src", "6Workstation-6.8.z:expat-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-debuginfo-0:2.0.1-13.el6_8.x86_64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.i686", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.ppc64", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.s390x", "6Workstation-6.8.z:expat-devel-0:2.0.1-13.el6_8.x86_64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Client-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Client-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7ComputeNode-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7ComputeNode-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Server-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Server-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.src", "7Workstation-optional-7.3.Z:expat-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-debuginfo-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-devel-0:2.1.0-10.el7_3.x86_64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.aarch64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.i686", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.ppc64le", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.s390x", "7Workstation-optional-7.3.Z:expat-static-0:2.1.0-10.el7_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: Out-of-bounds heap read on crafted input causing crash" } ] }
rhsa-2018_2486
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Pack Apache Server 2.4.29 packages for Microsoft Windows and Oracle Solaris are now available.\n\nRed Hat Product Security has rated this release as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.29 packages that are part\nof the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.23, and includes bug fixes and enhancements. Refer\nto the Release Notes for information on the most significant bug fixes,\nenhancements and component upgrades included in this release.\n\nSecurity Fix(es):\n\n* expat: Out-of-bounds heap read on crafted input causing crash (CVE-2016-0718)\n* curl: escape and unescape integer overflows (CVE-2016-7167)\n* curl: Cookie injection for other servers (CVE-2016-8615)\n* curl: Case insensitive password comparison (CVE-2016-8616)\n* curl: Out-of-bounds write via unchecked multiplication (CVE-2016-8617)\n* curl: Double-free in curl_maprintf (CVE-2016-8618)\n* curl: Double-free in krb5 code (CVE-2016-8619)\n* curl: curl_getdate out-of-bounds read (CVE-2016-8621)\n* curl: URL unescape heap overflow via integer truncation (CVE-2016-8622)\n* curl: Use-after-free via shared cookies (CVE-2016-8623)\n* curl: Invalid URL parsing with \u0027#\u0027 (CVE-2016-8624)\n* curl: IDNA 2003 makes curl use wrong host (CVE-2016-8625)\n* libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS) (CVE-2016-9598)\n* pcre: Out-of-bounds read in compile_bracket_matchingpath function (8.41/3) (CVE-2017-6004)\n* pcre: Invalid Unicode property lookup (8.41/7, 10.24/2) (CVE-2017-7186)\n* pcre: invalid memory read in_pcre32_xclass (pcre_xclass.c) (CVE-2017-7244)\n* pcre: stack-based buffer overflow write in pcre32_copy_substring (CVE-2017-7245)\n* pcre: stack-based buffer overflow write in pcre32_copy_substring (CVE-2017-7246)\n* curl: FTP PWD response parser out of bounds read (CVE-2017-1000254)\n* curl: IMAP FETCH response out of bounds read (CVE-2017-1000257)\n* curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP (CVE-2018-0500)\n\nDetails around this issue, including information about the CVE, severity of\nthe issue, and the CVSS score can be found on the CVE page listed in the\nReference section below.\n\nThe following packages have been upgraded to a newer upstream version:\n* Curl (7.57.0)\n* OpenSSL (1.0.2n)\n* Expat (2.2.5)\n* PCRE (8.41)\n* libxml2 (2.9.7)\n\nAcknowledgements:\n\nCVE-2017-1000254: Red Hat would like to thank Daniel Stenberg for reporting this issue.\nUpstream acknowledges Max Dymond as the original reporter.\nCVE-2017-1000257: Red Hat would like to thank the Curl project for reporting this issue. Upstream acknowledges Brian Carpenter, (the OSS-Fuzz project) as the original reporter.\nCVE-2018-0500: Red Hat would like to thank the Curl project for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2486", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/html-single/red_hat_jboss_core_services_apache_http_server_2.4.29_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/html-single/red_hat_jboss_core_services_apache_http_server_2.4.29_release_notes/" }, { "category": "external", "summary": "1296102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "category": "external", "summary": "1375906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375906" }, { "category": "external", "summary": "1388370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388370" }, { "category": "external", "summary": "1388371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388371" }, { "category": "external", "summary": "1388377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388377" }, { "category": "external", "summary": "1388378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388378" }, { "category": "external", "summary": "1388379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388379" }, { "category": "external", "summary": "1388385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388385" }, { "category": "external", "summary": "1388386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388386" }, { "category": "external", "summary": "1388388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388388" }, { "category": "external", "summary": "1388390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388390" }, { "category": "external", "summary": "1388392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388392" }, { "category": "external", "summary": "1408306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408306" }, { "category": "external", "summary": "1425365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425365" }, { "category": "external", "summary": "1434504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1434504" }, { "category": "external", "summary": "1437364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437364" }, { "category": "external", "summary": "1437367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437367" }, { "category": "external", "summary": "1437369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437369" }, { "category": "external", "summary": "1495541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495541" }, { "category": "external", "summary": "1503705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503705" }, { "category": "external", "summary": "1597101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597101" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2018/rhsa-2018_2486.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update", "tracking": { "current_release_date": "2024-09-16T01:43:41+00:00", "generator": { "date": "2024-09-16T01:43:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2018:2486", "initial_release_date": "2018-08-16T16:06:16+00:00", "revision_history": [ { "date": "2018-08-16T16:06:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-16T16:06:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-16T01:43:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services 1", "product": { "name": "Red Hat JBoss Core Services 1", "product_id": "Red Hat JBoss Core Services 1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Gustavo Grieco" ] } ], "cve": "CVE-2016-0718", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1296102" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in the way Expat processed certain input. A remote attacker could send specially crafted XML that, when parsed by an application using the Expat library, would cause that application to crash or, possibly, execute arbitrary code with the permission of the user running the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "expat: Out-of-bounds heap read on crafted input causing crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0718" }, { "category": "external", "summary": "RHBZ#1296102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0718", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718" } ], "release_date": "2016-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "expat: Out-of-bounds heap read on crafted input causing crash" }, { "cve": "CVE-2016-4975", "cwe": { "id": "CWE-113", "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)" }, "discovery_date": "2016-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375968" } ], "notes": [ { "category": "description", "text": "It was found that Apache was vulnerable to a HTTP response splitting attack for sites which use mod_userdir. An attacker could use this flaw to inject CRLF characters into the HTTP header and could possibly gain access to secure data.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4975" }, { "category": "external", "summary": "RHBZ#1375968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375968" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4975", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4975" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4975", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4975" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975", "url": "https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir" }, { "cve": "CVE-2016-5131", "discovery_date": "2016-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1358641" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use after free triggered by XPointer paths beginning with range-to", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw in libxml2 requires exposing the library to XPath/XPointer expressions from an untrusted source, which is not common in practice for applications using libxml2. For libxml2, Red Hat Product Security has rated this vulnerability as Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5131" }, { "category": "external", "summary": "RHBZ#1358641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5131", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5131" }, { "category": "external", "summary": "https://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html", "url": "https://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html" } ], "release_date": "2016-07-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "libxml2: Use after free triggered by XPointer paths beginning with range-to" }, { "cve": "CVE-2016-7167", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2016-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375906" } ], "notes": [ { "category": "description", "text": "Multiple integer overflow flaws leading to heap-based buffer overflows were found in the way curl handled escaping and unescaping of data. An attacker could potentially use these flaws to crash an application using libcurl by sending a specially crafted input to the affected libcurl functions.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: escape and unescape integer overflows", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7167" }, { "category": "external", "summary": "RHBZ#1375906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375906" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7167", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7167" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7167", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7167" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20160914.html", "url": "https://curl.haxx.se/docs/adv_20160914.html" } ], "release_date": "2016-09-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: escape and unescape integer overflows" }, { "cve": "CVE-2016-8615", "cwe": { "id": "CWE-99", "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388370" } ], "notes": [ { "category": "description", "text": "A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Cookie injection for other servers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8615" }, { "category": "external", "summary": "RHBZ#1388370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388370" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8615", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8615" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8615", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8615" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102A.html", "url": "https://curl.haxx.se/docs/adv_20161102A.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Cookie injection for other servers" }, { "cve": "CVE-2016-8616", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388371" } ], "notes": [ { "category": "description", "text": "A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Case insensitive password comparison", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8616" }, { "category": "external", "summary": "RHBZ#1388371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8616", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8616" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8616", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8616" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102B.html", "url": "https://curl.haxx.se/docs/adv_20161102B.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: Case insensitive password comparison" }, { "cve": "CVE-2016-8617", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388377" } ], "notes": [ { "category": "description", "text": "The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Out-of-bounds write via unchecked multiplication", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8617" }, { "category": "external", "summary": "RHBZ#1388377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388377" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8617", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8617" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8617", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8617" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102C.html", "url": "https://curl.haxx.se/docs/adv_20161102C.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Out-of-bounds write via unchecked multiplication" }, { "cve": "CVE-2016-8618", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388378" } ], "notes": [ { "category": "description", "text": "The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Double-free in curl_maprintf", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8618" }, { "category": "external", "summary": "RHBZ#1388378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388378" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8618", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8618" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8618", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8618" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102D.html", "url": "https://curl.haxx.se/docs/adv_20161102D.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Double-free in curl_maprintf" }, { "cve": "CVE-2016-8619", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388379" } ], "notes": [ { "category": "description", "text": "The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Double-free in krb5 code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8619" }, { "category": "external", "summary": "RHBZ#1388379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8619", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8619" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102E.html", "url": "https://curl.haxx.se/docs/adv_20161102E.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Double-free in krb5 code" }, { "cve": "CVE-2016-8621", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388385" } ], "notes": [ { "category": "description", "text": "The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: curl_getdate out-of-bounds read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8621" }, { "category": "external", "summary": "RHBZ#1388385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388385" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8621", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8621" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8621", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8621" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102G.html", "url": "https://curl.haxx.se/docs/adv_20161102G.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: curl_getdate out-of-bounds read" }, { "cve": "CVE-2016-8622", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388386" } ], "notes": [ { "category": "description", "text": "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: URL unescape heap overflow via integer truncation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8622" }, { "category": "external", "summary": "RHBZ#1388386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8622", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8622" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8622", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8622" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102H.html", "url": "https://curl.haxx.se/docs/adv_20161102H.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: URL unescape heap overflow via integer truncation" }, { "cve": "CVE-2016-8623", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388388" } ], "notes": [ { "category": "description", "text": "A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Use-after-free via shared cookies", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8623" }, { "category": "external", "summary": "RHBZ#1388388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8623", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8623" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102I.html", "url": "https://curl.haxx.se/docs/adv_20161102I.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "curl: Use-after-free via shared cookies" }, { "cve": "CVE-2016-8624", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388390" } ], "notes": [ { "category": "description", "text": "curl before version 7.51.0 doesn\u0027t parse the authority component of the URL correctly when the host name part ends with a \u0027#\u0027 character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Invalid URL parsing with \u0027#\u0027", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8624" }, { "category": "external", "summary": "RHBZ#1388390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388390" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8624", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8624" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8624", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8624" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102J.html", "url": "https://curl.haxx.se/docs/adv_20161102J.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Invalid URL parsing with \u0027#\u0027" }, { "cve": "CVE-2016-8625", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1388392" } ], "notes": [ { "category": "description", "text": "curl before version 7.51.0 uses outdated IDNA 2003 standard to handle International Domain Names and this may lead users to potentially and unknowingly issue network transfer requests to the wrong host.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: IDNA 2003 makes curl use wrong host", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8625" }, { "category": "external", "summary": "RHBZ#1388392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388392" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8625", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8625" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20161102K.html", "url": "https://curl.haxx.se/docs/adv_20161102K.html" } ], "release_date": "2016-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: IDNA 2003 makes curl use wrong host" }, { "cve": "CVE-2016-9318", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2016-11-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1395609" } ], "notes": [ { "category": "description", "text": "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: XML External Entity vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-9318" }, { "category": "external", "summary": "RHBZ#1395609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395609" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9318", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9318" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9318", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9318" } ], "release_date": "2016-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "category": "workaround", "details": "Application parsing untrusted input with libxml2 should be careful to NOT use entity expansion (enabled by XML_PARSE_NOENT) or DTD validation (XML_PARSE_DTDLOAD, XML_PARSE_DTDVALID) on such input.", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: XML External Entity vulnerability" }, { "cve": "CVE-2016-9596", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1408302" } ], "notes": [ { "category": "description", "text": "libxml2, as used in Red Hat JBoss Core Services and when in recovery mode, allows context-dependent attackers to cause a denial of service (stack consumption) via a crafted XML document. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-3627.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: stack exhaustion while parsing xml files in recovery mode (unfixed CVE-2016-3627 in JBCS)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-9596" }, { "category": "external", "summary": "RHBZ#1408302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408302" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9596", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9596" } ], "release_date": "2016-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: stack exhaustion while parsing xml files in recovery mode (unfixed CVE-2016-3627 in JBCS)" }, { "cve": "CVE-2016-9597", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1408305" } ], "notes": [ { "category": "description", "text": "It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: stack overflow before detecting invalid XML file (unfixed CVE-2016-3705 in JBCS)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-9597" }, { "category": "external", "summary": "RHBZ#1408305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9597", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9597" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9597", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9597" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: stack overflow before detecting invalid XML file (unfixed CVE-2016-3705 in JBCS)" }, { "cve": "CVE-2016-9598", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-05-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1408306" } ], "notes": [ { "category": "description", "text": "libxml2, as used in Red Hat JBoss Core Services, allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted XML document. NOTE: this vulnerability exists because of a missing fix for CVE-2016-4483.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-9598" }, { "category": "external", "summary": "RHBZ#1408306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408306" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-9598", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9598" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-9598", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9598" } ], "release_date": "2016-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: out-of-bounds read (unfixed CVE-2016-4483 in JBCS)" }, { "cve": "CVE-2017-6004", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1425365" } ], "notes": [ { "category": "description", "text": "The compile_bracket_matchingpath function in pcre_jit_compile.c in PCRE through 8.x before revision 1680 (e.g., the PHP 7.1.1 bundled version) allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted regular expression.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: Out-of-bounds read in compile_bracket_matchingpath function (8.41/3)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-6004" }, { "category": "external", "summary": "RHBZ#1425365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425365" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-6004", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-6004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6004" } ], "release_date": "2017-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "pcre: Out-of-bounds read in compile_bracket_matchingpath function (8.41/3)" }, { "cve": "CVE-2017-7186", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1434504" } ], "notes": [ { "category": "description", "text": "libpcre1 in PCRE 8.40 and libpcre2 in PCRE2 10.23 allow remote attackers to cause a denial of service (segmentation violation for read access, and application crash) by triggering an invalid Unicode property lookup.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: Invalid Unicode property lookup (8.41/7, 10.24/2)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7186" }, { "category": "external", "summary": "RHBZ#1434504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1434504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7186", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7186" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7186", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7186" } ], "release_date": "2017-02-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "pcre: Invalid Unicode property lookup (8.41/7, 10.24/2)" }, { "cve": "CVE-2017-7244", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1437364" } ], "notes": [ { "category": "description", "text": "The _pcre32_xclass function in pcre_xclass.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (invalid memory read) via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: invalid memory read in _pcre32_xclass (pcre_xclass.c)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7244" }, { "category": "external", "summary": "RHBZ#1437364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437364" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7244", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7244" }, { "category": "external", "summary": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/", "url": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/" } ], "release_date": "2017-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "pcre: invalid memory read in _pcre32_xclass (pcre_xclass.c)" }, { "cve": "CVE-2017-7245", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1437367" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: stack-based buffer overflow write in pcre32_copy_substring", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7245" }, { "category": "external", "summary": "RHBZ#1437367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437367" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7245", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7245" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7245", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7245" }, { "category": "external", "summary": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/", "url": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/" } ], "release_date": "2017-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "pcre: stack-based buffer overflow write in pcre32_copy_substring" }, { "cve": "CVE-2017-7246", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1437369" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "pcre: stack-based buffer overflow write in pcre32_copy_substring", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7246" }, { "category": "external", "summary": "RHBZ#1437369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437369" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7246", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7246" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7246", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7246" }, { "category": "external", "summary": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/", "url": "https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/" } ], "release_date": "2017-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "pcre: stack-based buffer overflow write in pcre32_copy_substring" }, { "cve": "CVE-2017-9047", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1452554" } ], "notes": [ { "category": "description", "text": "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. The variable len is assigned strlen(buf). If the content-\u003etype is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-\u003eprefix is appended to buf (if it actually fits) whereupon (ii) content-\u003ename is written to the buffer. However, the check for whether the content-\u003ename actually fits also uses \u0027len\u0027 rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Buffer overflow in function xmlSnprintfElementContent", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability exists in the DTD validation functionality of libxml2. Applications that do not attempt to validate untrusted documents are not impacted.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9047" }, { "category": "external", "summary": "RHBZ#1452554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9047", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9047" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9047", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9047" } ], "release_date": "2017-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Buffer overflow in function xmlSnprintfElementContent" }, { "cve": "CVE-2017-9048", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2017-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1452549" } ], "notes": [ { "category": "description", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 \u003c size. This vulnerability causes programs that use libxml2, such as PHP, to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Stack-based buffer overflow in function xmlSnprintfElementContent", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability exists in the DTD validation functionality of libxml2. Applications that do not attempt to validate untrusted documents are not impacted.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9048" }, { "category": "external", "summary": "RHBZ#1452549", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452549" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9048", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9048" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9048", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9048" } ], "release_date": "2017-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libxml2: Stack-based buffer overflow in function xmlSnprintfElementContent" }, { "cve": "CVE-2017-9049", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1452556" } ], "notes": [ { "category": "description", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer over-read in function xmlDictComputeFastKey", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9049" }, { "category": "external", "summary": "RHBZ#1452556", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452556" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9049", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9049" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9049", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9049" } ], "release_date": "2017-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer over-read in function xmlDictComputeFastKey" }, { "cve": "CVE-2017-9050", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1452553" } ], "notes": [ { "category": "description", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Heap-based buffer over-read in function xmlDictAddString", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9050" }, { "category": "external", "summary": "RHBZ#1452553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452553" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9050", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9050" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9050", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9050" } ], "release_date": "2017-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libxml2: Heap-based buffer over-read in function xmlDictAddString" }, { "cve": "CVE-2017-18258", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-04-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566749" } ], "notes": [ { "category": "description", "text": "The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Unrestricted memory usage in xz_head() function in xzlib.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-18258" }, { "category": "external", "summary": "RHBZ#1566749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566749" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-18258", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18258" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18258", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18258" } ], "release_date": "2017-09-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libxml2: Unrestricted memory usage in xz_head() function in xzlib.c" }, { "acknowledgments": [ { "names": [ "the Curl project" ] }, { "names": [ "Max Dymond" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2017-1000254", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495541" } ], "notes": [ { "category": "description", "text": "libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the `PWD` command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7), March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: FTP PWD response parser out of bounds read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000254" }, { "category": "external", "summary": "RHBZ#1495541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000254", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000254" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20171004.html", "url": "https://curl.haxx.se/docs/adv_20171004.html" } ], "release_date": "2017-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: FTP PWD response parser out of bounds read" }, { "acknowledgments": [ { "names": [ "the Curl project" ] }, { "names": [ "Brian Carpenter", "the OSS-Fuzz project" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2017-1000257", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1503705" } ], "notes": [ { "category": "description", "text": "A buffer overrun flaw was found in the IMAP handler of libcurl. By tricking an unsuspecting user into connecting to a malicious IMAP server, an attacker could exploit this flaw to potentially cause information disclosure or crash the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: IMAP FETCH response out of bounds read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000257" }, { "category": "external", "summary": "RHBZ#1503705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000257", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000257" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000257", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000257" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_20171023.html", "url": "https://curl.haxx.se/docs/adv_20171023.html" } ], "release_date": "2017-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "category": "workaround", "details": "Switch off IMAP in `CURLOPT_PROTOCOLS`", "product_ids": [ "Red Hat JBoss Core Services 1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: IMAP FETCH response out of bounds read" }, { "acknowledgments": [ { "names": [ "the Curl project" ] }, { "names": [ "Peter Wu" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2018-0500", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2018-07-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1597101" } ], "notes": [ { "category": "description", "text": "A heap-based buffer overflow has been found in the Curl_smtp_escape_eob() function of curl. An attacker could exploit this by convincing a user to use curl to upload data over SMTP with a reduced buffer to cause a crash or corrupt memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of curl/libcurl as shipped with Red Hat Enterprise Linux 5, 6 and 7 as they did not include the vulnerable code.\n\nThis issue did not affect the versions of curl/libcurl as shipped with Red Hat Software Collections 3 as they did not include the vulnerable code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0500" }, { "category": "external", "summary": "RHBZ#1597101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0500", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0500" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0500", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0500" }, { "category": "external", "summary": "https://curl.haxx.se/docs/adv_2018-70a2.html", "url": "https://curl.haxx.se/docs/adv_2018-70a2.html" } ], "release_date": "2018-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2486" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "curl: Heap-based buffer overflow in Curl_smtp_escape_eob() when uploading data over SMTP" } ] }
ghsa-3f8j-8ww3-q7v6
Vulnerability from github
Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
{ "affected": [], "aliases": [ "CVE-2016-0718" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-05-26T16:59:00Z", "severity": "CRITICAL" }, "details": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.", "id": "GHSA-3f8j-8ww3-q7v6", "modified": "2025-04-12T13:00:30Z", "published": "2022-05-13T01:07:38Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2016:2824" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2016-0718" }, { "type": "WEB", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201701-21" }, { "type": "WEB", "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "type": "WEB", "url": "https://support.apple.com/HT206903" }, { "type": "WEB", "url": "https://www.tenable.com/security/tns-2016-20" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2824.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2017/Feb/68" }, { "type": "WEB", "url": "http://support.eset.com/ca6333" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3582" }, { "type": "WEB", "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/90729" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1036348" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1036415" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1037705" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2983-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3044-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2016-0718
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2016-0718", "description": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.", "id": "GSD-2016-0718", "references": [ "https://www.suse.com/security/cve/CVE-2016-0718.html", "https://www.debian.org/security/2016/dsa-3582", "https://access.redhat.com/errata/RHSA-2018:2486", "https://access.redhat.com/errata/RHSA-2016:2824", "https://ubuntu.com/security/CVE-2016-0718", "https://advisories.mageia.org/CVE-2016-0718.html", "https://alas.aws.amazon.com/cve/html/CVE-2016-0718.html", "https://linux.oracle.com/cve/CVE-2016-0718.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-0718" ], "details": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.", "id": "GSD-2016-0718", "modified": "2023-12-13T01:21:17.573965Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-0718", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "name": "http://www.securitytracker.com/id/1036348", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1036348" }, { "name": "https://support.apple.com/HT206903", "refsource": "MISC", "url": "https://support.apple.com/HT206903" }, { "name": "https://source.android.com/security/bulletin/2016-11-01.html", "refsource": "MISC", "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "https://security.gentoo.org/glsa/201701-21", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/201701-21" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "name": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2016-2824.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-2824.html" }, { "name": "http://seclists.org/fulldisclosure/2017/Feb/68", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2017/Feb/68" }, { "name": "http://support.eset.com/ca6333/", "refsource": "MISC", "url": "http://support.eset.com/ca6333/" }, { "name": "http://www.debian.org/security/2016/dsa-3582", "refsource": "MISC", "url": "http://www.debian.org/security/2016/dsa-3582" }, { "name": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html", "refsource": "MISC", "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "name": "http://www.openwall.com/lists/oss-security/2016/05/17/12", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "name": "http://www.securityfocus.com/bid/90729", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/90729" }, { "name": "http://www.securitytracker.com/id/1036415", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1036415" }, { "name": "http://www.securitytracker.com/id/1037705", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1037705" }, { "name": "http://www.ubuntu.com/usn/USN-2983-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-2983-1" }, { "name": "http://www.ubuntu.com/usn/USN-3044-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "name": "https://access.redhat.com/errata/RHSA-2018:2486", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923", "refsource": "MISC", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365", "refsource": "MISC", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" }, { "name": "https://www.tenable.com/security/tns-2016-20", "refsource": "MISC", "url": "https://www.tenable.com/security/tns-2016-20" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "48.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.11.5", "versionStartIncluding": "10.11.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mcafee:policy_auditor:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.5.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.6.2", "versionStartIncluding": "3.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.5.4", "versionStartIncluding": "3.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.4.7", "versionStartIncluding": "3.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.3.7", "versionStartIncluding": "3.3.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.7.15", "versionStartIncluding": "2.7.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-0718" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20160517 CVE-2016-0718: Expat XML Parser Crashes on Malformed Input", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "name": "DSA-3582", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3582" }, { "name": "USN-2983-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2983-1" }, { "name": "SUSE-SU-2016:1508", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "name": "SUSE-SU-2016:1512", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "name": "openSUSE-SU-2016:1523", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "name": "APPLE-SA-2016-07-18-1", "refsource": "APPLE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html" }, { "name": "https://support.apple.com/HT206903", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/HT206903" }, { "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "name": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "name": "USN-3044-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3044-1" }, { "name": "openSUSE-SU-2016:2026", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "name": "openSUSE-SU-2016:1964", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "name": "90729", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/90729" }, { "name": "https://source.android.com/security/bulletin/2016-11-01.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "openSUSE-SU-2016:1441", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "name": "http://support.eset.com/ca6333/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.eset.com/ca6333/" }, { "name": "20170227 CVE-2016-9892 - Remote Code Execution as Root via ESET Endpoint Antivirus 6", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2017/Feb/68" }, { "name": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html" }, { "name": "GLSA-201701-21", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201701-21" }, { "name": "1037705", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037705" }, { "name": "1036415", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036415" }, { "name": "1036348", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036348" }, { "name": "https://www.tenable.com/security/tns-2016-20", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2016-20" }, { "name": "RHSA-2016:2824", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2824.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "RHSA-2018:2486", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2486" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10365" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2023-02-12T23:15Z", "publishedDate": "2016-05-26T16:59Z" } } }
var-201605-0145
Vulnerability from variot
Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow. Expat are prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Attackers can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in denial-of-service conditions. Expat is a C language-based XML parser library developed by American software developer Jim Clark, which uses a stream-oriented parser. There is a security hole in Expat.
Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/expat-2.2.0-i586-1_slack14.2.txz: Upgraded. This update fixes bugs and security issues: Multiple integer overflows in XML_GetBuffer. Fix crash on malformed input. Improve insufficient fix to CVE-2015-1283 / CVE-2015-2716. Use more entropy for hash initialization. Resolve troublesome internal call to srand. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1283 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702 ( Security fix ) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/expat-2.2.0-i486-1_slack13.0.txz
Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/expat-2.2.0-x86_64-1_slack13.0.txz
Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/expat-2.2.0-i486-1_slack13.1.txz
Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/expat-2.2.0-x86_64-1_slack13.1.txz
Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/expat-2.2.0-i486-1_slack13.37.txz
Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/expat-2.2.0-x86_64-1_slack13.37.txz
Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/expat-2.2.0-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/expat-2.2.0-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/expat-2.2.0-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/expat-2.2.0-x86_64-1_slack14.1.txz
Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/expat-2.2.0-i586-1_slack14.2.txz
Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/expat-2.2.0-x86_64-1_slack14.2.txz
Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/expat-2.2.0-i586-1.txz
Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/expat-2.2.0-x86_64-1.txz
MD5 signatures: +-------------+
Slackware 13.0 package: d042603604cda3dedb7a75cb049071c8 expat-2.2.0-i486-1_slack13.0.txz
Slackware x86_64 13.0 package: 4c57af80cc3ccd277a365f8053dabd9b expat-2.2.0-x86_64-1_slack13.0.txz
Slackware 13.1 package: 649682e89895159e90c0775f056a5b2a expat-2.2.0-i486-1_slack13.1.txz
Slackware x86_64 13.1 package: dc109e48fb07db4aa47caa912308dcee expat-2.2.0-x86_64-1_slack13.1.txz
Slackware 13.37 package: a7893a356510073d213e08e6df41be6b expat-2.2.0-i486-1_slack13.37.txz
Slackware x86_64 13.37 package: 31f42e6ef7be259413659497f473b499 expat-2.2.0-x86_64-1_slack13.37.txz
Slackware 14.0 package: 3d5ab68ef82db833aa1b890372dfa789 expat-2.2.0-i486-1_slack14.0.txz
Slackware x86_64 14.0 package: 7ab4d2d05f4695904a4e164f6093ea38 expat-2.2.0-x86_64-1_slack14.0.txz
Slackware 14.1 package: 3e9c111a338efb49ed9aa85322e7dfed expat-2.2.0-i486-1_slack14.1.txz
Slackware x86_64 14.1 package: 5ec656840cad0813deeb632ef659d97b expat-2.2.0-x86_64-1_slack14.1.txz
Slackware 14.2 package: 770d5c370a923d7f1356bc81ceaaa3e9 expat-2.2.0-i586-1_slack14.2.txz
Slackware x86_64 14.2 package: 0b44169d48b17e181cddd25c547a0258 expat-2.2.0-x86_64-1_slack14.2.txz
Slackware -current package: bc2d54deb510e5a41845207133fc1a75 l/expat-2.2.0-i586-1.txz
Slackware x86_64 -current package: 4bf858ad9d41159ce9fe624e47d58f21 l/expat-2.2.0-x86_64-1.txz
Installation instructions: +------------------------+
Upgrade the package as root:
upgradepkg expat-2.2.0-i586-1_slack14.2.txz
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. ========================================================================= Ubuntu Security Notice USN-3044-1 August 05, 2016
firefox vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Firefox could be made to crash or run programs as your login if it opened a malicious website.
Software Description: - firefox: Mozilla Open Source web browser
Details:
Gustavo Grieco discovered an out-of-bounds read during XML parsing in some circumstances.
(CVE-2016-0718)
Toni Huttunen discovered that once a favicon is requested from a site, the remote server can keep the network connection open even after the pag e is closed. A remote attacked could potentially exploit this to track users, resulting in information disclosure. (CVE-2016-2830)
Christian Holler, Tyson Smith, Boris Zbarsky, Byron Campen, Julian Seward , Carsten Book, Gary Kwong, Jesse Ruderman, Andrew McCreight, and Phil Ringnalda discovered multiple memory safety issues in Firefox. (CVE-2016-2835, CVE-2016-2836)
A buffer overflow was discovered in the ClearKey Content Decryption Module (CDM) during video playback. (CVE-2016-2837)
Atte Kettunen discovered a buffer overflow when rendering SVG content in some circumstances. (CVE-2016-2838)
Bert Massop discovered a crash in Cairo with version 0.10 of FFmpeg. (CVE-2016-2839)
Catalin Dumitru discovered that URLs of resources loaded after a navigation start could be leaked to the following page via the Resource Timing API. An attacker could potentially exploit this to obtain sensitiv e information. (CVE-2016-5250)
Firas Salem discovered an issue with non-ASCII and emoji characters in data: URLs. An attacker could potentially exploit this to spoof the addressbar contents. (CVE-2016-5251)
Georg Koppen discovered a stack buffer underflow during 2D graphics rendering in some circumstances. (CVE-2016-5252)
Abhishek Arya discovered a use-after-free when the alt key is used with top-level menus. (CVE-2016-5254)
Jukka Jyl=C3=A4nki discovered a crash during garbage collection. (CVE-2016-5255)
Looben Yang discovered a use-after-free in WebRTC. (CVE-2016-5258)
Looben Yang discovered a use-after-free when working with nested sync events in service workers. (CVE-2016-5259)
Mike Kaply discovered that plain-text passwords can be stored in session restore if an input field type is changed from "password" to "text" durin g a session, leading to information disclosure. (CVE-2016-5260)
Samuel Gro=C3=9F discovered an integer overflow in WebSockets during data
buffering in some circumstances. (CVE-2016-5261)
Nikita Arykov discovered that JavaScript event handlers on a
attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2016-5262)
A type confusion bug was discovered in display transformation during rendering. (CVE-2016-5263)
A use-after-free was discovered when applying effects to SVG elements in some circumstances. (CVE-2016-5264)
Abdulrahman Alqabandi discovered a same-origin policy violation relating to local HTML files and saved shortcut files. An attacker could potentially exploit this to obtain sensitive information. (CVE-2016-5265)
Rafael Gieschke discovered an information disclosure issue related to drag and drop. An attacker could potentially exploit this to obtain sensitive information. (CVE-2016-5266)
A text injection issue was discovered with about: URLs. An attacker could
potentially exploit this to spoof internal error pages. (CVE-2016-5268)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 LTS: firefox 48.0+build2-0ubuntu0.16.04.1
Ubuntu 14.04 LTS: firefox 48.0+build2-0ubuntu0.14.04.1
Ubuntu 12.04 LTS: firefox 48.0+build2-0ubuntu0.12.04.1
After a standard system update you need to restart Firefox to make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: expat security update Advisory ID: RHSA-2016:2824-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2824.html Issue date: 2016-11-28 CVE Names: CVE-2016-0718 =====================================================================
- Summary:
An update for expat is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
Expat is a C library for parsing XML documents.
Security Fix(es):
- An out-of-bounds read flaw was found in the way Expat processed certain input. (CVE-2016-0718)
Red Hat would like to thank Gustavo Grieco for reporting this issue.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, applications using the Expat library must be restarted for the update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1296102 - CVE-2016-0718 expat: Out-of-bounds heap read on crafted input causing crash
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: expat-2.0.1-13.el6_8.src.rpm
i386: expat-2.0.1-13.el6_8.i686.rpm expat-debuginfo-2.0.1-13.el6_8.i686.rpm
x86_64: expat-2.0.1-13.el6_8.i686.rpm expat-2.0.1-13.el6_8.x86_64.rpm expat-debuginfo-2.0.1-13.el6_8.i686.rpm expat-debuginfo-2.0.1-13.el6_8.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386: expat-debuginfo-2.0.1-13.el6_8.i686.rpm expat-devel-2.0.1-13.el6_8.i686.rpm
x86_64: expat-debuginfo-2.0.1-13.el6_8.i686.rpm expat-debuginfo-2.0.1-13.el6_8.x86_64.rpm expat-devel-2.0.1-13.el6_8.i686.rpm expat-devel-2.0.1-13.el6_8.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: expat-2.0.1-13.el6_8.src.rpm
x86_64: expat-2.0.1-13.el6_8.i686.rpm expat-2.0.1-13.el6_8.x86_64.rpm expat-debuginfo-2.0.1-13.el6_8.i686.rpm expat-debuginfo-2.0.1-13.el6_8.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64: expat-debuginfo-2.0.1-13.el6_8.i686.rpm expat-debuginfo-2.0.1-13.el6_8.x86_64.rpm expat-devel-2.0.1-13.el6_8.i686.rpm expat-devel-2.0.1-13.el6_8.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: expat-2.0.1-13.el6_8.src.rpm
i386: expat-2.0.1-13.el6_8.i686.rpm expat-debuginfo-2.0.1-13.el6_8.i686.rpm expat-devel-2.0.1-13.el6_8.i686.rpm
ppc64: expat-2.0.1-13.el6_8.ppc.rpm expat-2.0.1-13.el6_8.ppc64.rpm expat-debuginfo-2.0.1-13.el6_8.ppc.rpm expat-debuginfo-2.0.1-13.el6_8.ppc64.rpm expat-devel-2.0.1-13.el6_8.ppc.rpm expat-devel-2.0.1-13.el6_8.ppc64.rpm
s390x: expat-2.0.1-13.el6_8.s390.rpm expat-2.0.1-13.el6_8.s390x.rpm expat-debuginfo-2.0.1-13.el6_8.s390.rpm expat-debuginfo-2.0.1-13.el6_8.s390x.rpm expat-devel-2.0.1-13.el6_8.s390.rpm expat-devel-2.0.1-13.el6_8.s390x.rpm
x86_64: expat-2.0.1-13.el6_8.i686.rpm expat-2.0.1-13.el6_8.x86_64.rpm expat-debuginfo-2.0.1-13.el6_8.i686.rpm expat-debuginfo-2.0.1-13.el6_8.x86_64.rpm expat-devel-2.0.1-13.el6_8.i686.rpm expat-devel-2.0.1-13.el6_8.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: expat-2.0.1-13.el6_8.src.rpm
i386: expat-2.0.1-13.el6_8.i686.rpm expat-debuginfo-2.0.1-13.el6_8.i686.rpm expat-devel-2.0.1-13.el6_8.i686.rpm
x86_64: expat-2.0.1-13.el6_8.i686.rpm expat-2.0.1-13.el6_8.x86_64.rpm expat-debuginfo-2.0.1-13.el6_8.i686.rpm expat-debuginfo-2.0.1-13.el6_8.x86_64.rpm expat-devel-2.0.1-13.el6_8.i686.rpm expat-devel-2.0.1-13.el6_8.x86_64.rpm
Red Hat Enterprise Linux Client (v. 7):
Source: expat-2.1.0-10.el7_3.src.rpm
x86_64: expat-2.1.0-10.el7_3.i686.rpm expat-2.1.0-10.el7_3.x86_64.rpm expat-debuginfo-2.1.0-10.el7_3.i686.rpm expat-debuginfo-2.1.0-10.el7_3.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: expat-debuginfo-2.1.0-10.el7_3.i686.rpm expat-debuginfo-2.1.0-10.el7_3.x86_64.rpm expat-devel-2.1.0-10.el7_3.i686.rpm expat-devel-2.1.0-10.el7_3.x86_64.rpm expat-static-2.1.0-10.el7_3.i686.rpm expat-static-2.1.0-10.el7_3.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: expat-2.1.0-10.el7_3.src.rpm
x86_64: expat-2.1.0-10.el7_3.i686.rpm expat-2.1.0-10.el7_3.x86_64.rpm expat-debuginfo-2.1.0-10.el7_3.i686.rpm expat-debuginfo-2.1.0-10.el7_3.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: expat-debuginfo-2.1.0-10.el7_3.i686.rpm expat-debuginfo-2.1.0-10.el7_3.x86_64.rpm expat-devel-2.1.0-10.el7_3.i686.rpm expat-devel-2.1.0-10.el7_3.x86_64.rpm expat-static-2.1.0-10.el7_3.i686.rpm expat-static-2.1.0-10.el7_3.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: expat-2.1.0-10.el7_3.src.rpm
aarch64: expat-2.1.0-10.el7_3.aarch64.rpm expat-debuginfo-2.1.0-10.el7_3.aarch64.rpm expat-devel-2.1.0-10.el7_3.aarch64.rpm
ppc64: expat-2.1.0-10.el7_3.ppc.rpm expat-2.1.0-10.el7_3.ppc64.rpm expat-debuginfo-2.1.0-10.el7_3.ppc.rpm expat-debuginfo-2.1.0-10.el7_3.ppc64.rpm expat-devel-2.1.0-10.el7_3.ppc.rpm expat-devel-2.1.0-10.el7_3.ppc64.rpm
ppc64le: expat-2.1.0-10.el7_3.ppc64le.rpm expat-debuginfo-2.1.0-10.el7_3.ppc64le.rpm expat-devel-2.1.0-10.el7_3.ppc64le.rpm
s390x: expat-2.1.0-10.el7_3.s390.rpm expat-2.1.0-10.el7_3.s390x.rpm expat-debuginfo-2.1.0-10.el7_3.s390.rpm expat-debuginfo-2.1.0-10.el7_3.s390x.rpm expat-devel-2.1.0-10.el7_3.s390.rpm expat-devel-2.1.0-10.el7_3.s390x.rpm
x86_64: expat-2.1.0-10.el7_3.i686.rpm expat-2.1.0-10.el7_3.x86_64.rpm expat-debuginfo-2.1.0-10.el7_3.i686.rpm expat-debuginfo-2.1.0-10.el7_3.x86_64.rpm expat-devel-2.1.0-10.el7_3.i686.rpm expat-devel-2.1.0-10.el7_3.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
aarch64: expat-debuginfo-2.1.0-10.el7_3.aarch64.rpm expat-static-2.1.0-10.el7_3.aarch64.rpm
ppc64: expat-debuginfo-2.1.0-10.el7_3.ppc.rpm expat-debuginfo-2.1.0-10.el7_3.ppc64.rpm expat-static-2.1.0-10.el7_3.ppc.rpm expat-static-2.1.0-10.el7_3.ppc64.rpm
ppc64le: expat-debuginfo-2.1.0-10.el7_3.ppc64le.rpm expat-static-2.1.0-10.el7_3.ppc64le.rpm
s390x: expat-debuginfo-2.1.0-10.el7_3.s390.rpm expat-debuginfo-2.1.0-10.el7_3.s390x.rpm expat-static-2.1.0-10.el7_3.s390.rpm expat-static-2.1.0-10.el7_3.s390x.rpm
x86_64: expat-debuginfo-2.1.0-10.el7_3.i686.rpm expat-debuginfo-2.1.0-10.el7_3.x86_64.rpm expat-static-2.1.0-10.el7_3.i686.rpm expat-static-2.1.0-10.el7_3.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: expat-2.1.0-10.el7_3.src.rpm
x86_64: expat-2.1.0-10.el7_3.i686.rpm expat-2.1.0-10.el7_3.x86_64.rpm expat-debuginfo-2.1.0-10.el7_3.i686.rpm expat-debuginfo-2.1.0-10.el7_3.x86_64.rpm expat-devel-2.1.0-10.el7_3.i686.rpm expat-devel-2.1.0-10.el7_3.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: expat-debuginfo-2.1.0-10.el7_3.i686.rpm expat-debuginfo-2.1.0-10.el7_3.x86_64.rpm expat-static-2.1.0-10.el7_3.i686.rpm expat-static-2.1.0-10.el7_3.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2016-0718 https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFYPIyBXlSAg2UNWIIRAmHXAJ0XmPOxvAJOT6/eusxHQBKBs/LPDgCguirS H8Bczzxw4Aj5YxGpyacoQBE= =GbHX -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
Gentoo Linux Security Advisory GLSA 201701-21
https://security.gentoo.org/
Severity: Normal Title: Expat: Multiple vulnerabilities Date: January 11, 2017 Bugs: #458742, #555642, #577928, #583268, #585510 ID: 201701-21
Synopsis
Multiple vulnerabilities have been found in Expat, the worst of which may allow execution of arbitrary code.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-libs/expat < 2.2.0-r1 >= 2.2.0-r1
Description
Multiple vulnerabilities have been discovered in Expat. Please review the CVE identifiers referenced below for details. This attack could also be used against automated systems that arbitrarily process XML files.
Workaround
There is no known workaround at this time.
Resolution
All Expat users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/expat-2.2.0-r1"
References
[ 1 ] CVE-2012-6702 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6702 [ 2 ] CVE-2013-0340 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0340 [ 3 ] CVE-2015-1283 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1283 [ 4 ] CVE-2016-0718 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0718 [ 5 ] CVE-2016-4472 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4472 [ 6 ] CVE-2016-5300 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5300
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201701-21
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2017-03-28-2 Additional information for APPLE-SA-2017-03-22-1 iTunes for Windows 12.6
iTunes for Windows 12.6 addresses the following:
APNs Server Available for: Windows 7 and later Impact: An attacker in a privileged network position can track a user's activity Description: A client certificate was sent in plaintext. This issue was addressed through improved certificate handling. CVE-2017-2383: Matthias Wachs and Quirin Scheitle of Technical University Munich (TUM) Entry added March 28, 2017
iTunes Available for: Windows 7 and later Impact: Multiple issues in SQLite Description: Multiple issues existed in SQLite. These issues were addressed by updating SQLite to version 3.15.2. These issues were addressed by updating expat to version 2.2.0. CVE-2009-3270 CVE-2009-3560 CVE-2009-3720 CVE-2012-1147 CVE-2012-1148 CVE-2012-6702 CVE-2015-1283 CVE-2016-0718 CVE-2016-4472 CVE-2016-5300
libxslt Available for: Windows 7 and later Impact: Multiple vulnerabilities in libxslt Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2017-5029: Holger Fuhrmannek Entry added March 28, 2017
WebKit Available for: Windows 7 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2017-2463: Kai Kang (4B5F5F4B) of Tencent's Xuanwu Lab (tencent.com) working with Trend Micro's Zero Day Initiative Entry added March 28, 2017
WebKit Available for: Windows 7 and later Impact: Processing maliciously crafted web content may exfiltrate data cross-origin Description: A validation issue existed in element handling. This issue was addressed through improved validation. CVE-2017-2479: lokihardt of Google Project Zero CVE-2017-2480: lokihardt of Google Project Zero Entry added March 28, 2017
Installation note:
iTunes for Windows 12.6 may be obtained from: https://www.apple.com/itunes/download/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org
iQIcBAEBCgAGBQJY2sl6AAoJEIOj74w0bLRGEMAQAJjPU9+iTIEs0o4EfazvmkXj /zLRgzdfr1kp9Iu90U/ZxgnAO3ZUqEF/6FWy6dN3zSA7AlP7q+zFlxXqbkoJB+eX sE+vGilHWZ8p2Qud9EikwDKCvLNn/4xYQ9Nm0jCwA14VBS1dBlOrFUlsnM9EoS9/ YKks/NSYV9jtLgKvc42SeTks62tLL5ZQGMKv+Gg0HH2Yeug2eAHGb+u5vYCHTcER AMTKKQtr57IJyz2tg7YZGWvbKIS2690CpIyZGxpbUCKv+dNdEPsDTNHjjpzwMBtc diSIIX8AC6T0nWbrOFtWqhhFyWk6rZAWb8RvDYYd/a6ro7hxYq8xZATBS2BJFskp esMHBuFYgDwIeJiGaCW07UyJzyzDck7pesJeq7gqF+O5Fl6bdHN4b8rNmVtBvDom g7tkwSE9+ZmiPUMJGF2NUWNb4+yY0OPm3Uq2kvoyXl5KGmEaFMoDnPzKIdPmE+b+ lJZUYgQSXlO6B7uz+MBx2ntH1uhIrAdKhFiePYj/lujNB3lTij5zpCOLyivdEXZw iJHX211+FpS8VV1/dHOjgbYnvnw4wofbPN63dkYvwgwwWy7VISThXQuMqtDW/wOE 9h0me2NkZRxQ845p4MaLPqZQFi1WcU4/PbcBBb0CvBwlnonYP/YRnyQrNWx+36Fo VkUmhXDNi0csm+QTi7ZP =hPjT -----END PGP SIGNATURE-----
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-3582-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso May 18, 2016 https://www.debian.org/security/faq
Package : expat CVE ID : CVE-2016-0718
Gustavo Grieco discovered that Expat, an XML parsing C library, does not properly handle certain kinds of malformed input documents, resulting in buffer overflows during processing and error reporting.
For the stable distribution (jessie), this problem has been fixed in version 2.1.0-6+deb8u2. Additionally this update refreshes the fix for CVE-2015-1283 to avoid relying on undefined behavior.
We recommend that you upgrade your expat packages
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201605-0145", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "debian", "version": "8.0" }, { "model": "mac os x", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "10.11.0" }, { "model": "leap", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "42.1" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "libexpat", "scope": "lt", "trust": 1.0, "vendor": "libexpat", "version": "2.2.0" }, { "model": "python", "scope": "gte", "trust": 1.0, "vendor": "python", "version": "2.7.0" }, { "model": "python", "scope": "lt", "trust": 1.0, "vendor": "python", "version": "3.6.2" }, { "model": "python", "scope": "lt", "trust": 1.0, "vendor": "python", "version": "3.5.4" }, { "model": "python", "scope": "lt", "trust": 1.0, "vendor": "python", "version": "3.3.7" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "python", "scope": "lt", "trust": 1.0, "vendor": "python", "version": "2.7.15" }, { "model": "python", "scope": "gte", "trust": 1.0, "vendor": "python", "version": "3.3.0" }, { "model": "python", "scope": "lt", "trust": 1.0, "vendor": "python", "version": "3.4.7" }, { "model": "python", "scope": "gte", "trust": 1.0, "vendor": "python", "version": "3.5.0" }, { "model": "python", "scope": "gte", "trust": 1.0, "vendor": "python", "version": "3.4.0" }, { "model": "python", "scope": "gte", "trust": 1.0, "vendor": "python", "version": "3.6.0" }, { "model": "policy auditor", "scope": "lt", "trust": 1.0, "vendor": "mcafee", "version": "6.5.1" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "13.2" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "firefox", "scope": "lt", "trust": 1.0, "vendor": "mozilla", "version": "48.0" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "13.1" }, { "model": "linux enterprise debuginfo", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "mac os x", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.11.5" }, { "model": "studio onsite", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "1.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "31" }, { "model": "big-ip afm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.6" }, { "model": "big-ip gtm hf9", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.9" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip analytics hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip analytics build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.110.104.180" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.8" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip aam build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.40.1.256" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.1" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7.0.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "4.0.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip afm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.7" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.7" }, { "model": "big-ip gtm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip analytics hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "11.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "36.0.4" }, { "model": "big-ip afm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.11" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip link controller build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.01.14.628" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "20.0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.4" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7.0.3" }, { "model": "expat 2.1.0-6+deb8u2", "scope": "ne", "trust": 0.3, "vendor": "debian", "version": null }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip aam hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.2" }, { "model": "big-ip pem hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "11.1.0.0" }, { "model": "big-ip pem hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.12" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip afm hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip aam hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.16" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.4" }, { "model": "big-ip afm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip link controller hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "14.01" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.4.0" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.7" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "22.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip ltm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.7" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip aam hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip aam hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "13.0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.2" }, { "model": "big-ip afm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.01.14.628" }, { "model": "big-ip asm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "37.0.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.19" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "26" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.20" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "43.0.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "36.0.3" }, { "model": "big-ip afm hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "40" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "33" }, { "model": "big-ip pem hf9", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.9" }, { "model": "big-ip gtm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip aam hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "47" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.3" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5.0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "35" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip afm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.17" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.1" }, { "model": "big-ip afm hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.11" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.1" }, { "model": "big-ip pem hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.08" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "44" }, { "model": "big-ip link controller hf9", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.3" }, { "model": "big-ip ltm hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "37" }, { "model": "big-ip link controller hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.6" }, { "model": "websphere application server liberty pr", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5.0-" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5" }, { "model": "big-ip afm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.10.1" }, { "model": "big-ip link controller hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0" }, { "model": "big-ip link controller", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "27.0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "20.0" }, { "model": "big-ip gtm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip afm build 685-hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip gtm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.7" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.17" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.13" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "18.0.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.2" }, { "model": "big-ip aam hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.13" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.12" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.9" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.0.13" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.15" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip dns build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.01.14.628" }, { "model": "netezza analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.24" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.1" }, { "model": "big-ip pem hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "6.0.2" }, { "model": "big-ip afm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.110.104.180" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5.0.7" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "big-ip ltm hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "8.0.1" }, { "model": "big-ip link controller hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip aam hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "7.0.1" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.7" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.19" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "28" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip afm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip aam hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.7" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.1" }, { "model": "big-ip link controller hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip asm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip afm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip pem hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "24.1" }, { "model": "big-ip analytics hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip aam build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.66.204.442" }, { "model": "big-ip ltm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.6" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip afm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.2" }, { "model": "big-ip websafe hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip analytics hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.3" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip link controller hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip gtm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.18" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.10" }, { "model": "big-ip gtm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.110.104.180" }, { "model": "big-ip aam hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "31.8" }, { "model": "big-ip gtm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip aam hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip analytics hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "25.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.10" }, { "model": "big-ip link controller hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.18" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.23" }, { "model": "big-ip aam hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.8" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.9.1" }, { "model": "big-ip ltm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "8.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip aam hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "16.0.1" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.10" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.17" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.26" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "9.0.1" }, { "model": "big-ip pem hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "12.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.11" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.27" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.1" }, { "model": "big-ip analytics hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip analytics hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.13" }, { "model": "big-ip analytics hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.9.2" }, { "model": "big-ip gtm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "expat", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "2.1.1-1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "38" }, { "model": "big-ip ltm hf9", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "31.1" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7.0.1" }, { "model": "expat 2.1.0-1+deb7u2", "scope": null, "trust": 0.3, "vendor": "debian", "version": null }, { "model": "big-ip link controller hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip aam hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip link controller hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip ltm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip asm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.8" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.11.6" }, { "model": "big-ip ltm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.3" }, { "model": "big-ip afm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.14" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip gtm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.7" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip asm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.3" }, { "model": "big-ip asm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "41.0.2" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip pem hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.11" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "24.1.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.15" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.8" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "43.0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.12" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.19" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.15" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "44.0.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "41" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.4" }, { "model": "big-ip asm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.40.1.256" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip analytics hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.18" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.9" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.0.1" }, { "model": "big-ip gtm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.6" }, { "model": "big-ip ltm hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip aam build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.01.14.628" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.6" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.16" }, { "model": "big-ip analytics hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.6" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip afm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.25" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.11" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "36" }, { "model": "big-ip gtm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "expat 2.1.0-6+deb8u1", "scope": null, "trust": 0.3, "vendor": "debian", "version": null }, { "model": "big-ip link controller hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.13" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.6" }, { "model": "big-ip pem hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "40.0.3" }, { "model": "big-ip asm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "15" }, { "model": "big-ip asm hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip asm hf9", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.5" }, { "model": "big-ip afm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.2" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.22" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.9" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.1.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.5" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.20" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.3" }, { "model": "big-ip pem hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.7" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip afm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "19.0.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.6.1" }, { "model": "big-ip aam hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip analytics hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip aam hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip link controller hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip ltm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip ltm hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7.0.7" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip asm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.17" }, { "model": "big-ip afm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip afm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip link controller hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.10" }, { "model": "big-ip afm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip aam hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip afm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip analytics build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.40.1.256" }, { "model": "netezza analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0" }, { "model": "big-ip dns", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.3" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "27" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip aam build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.110.104.180" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.14" }, { "model": "big-ip pem hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "4.0" }, { "model": "big-ip ltm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.1" }, { "model": "big-ip aam hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip analytics hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "30" }, { "model": "big-ip analytics hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip ltm hf6", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip ltm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip link controller hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip analytics build 685-hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "19.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "14.0.1" }, { "model": "big-ip link controller hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip pem hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "43" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip analytics hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "29" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.1" }, { "model": "big-ip aam hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip gtm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.6" }, { "model": "websphere application server full profile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.9" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "32.0.3" }, { "model": "big-ip aam", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.5" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.2" }, { "model": "big-ip asm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.4" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip pem hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.6" }, { "model": "big-ip dns hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.3" }, { "model": "big-ip analytics hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "expat", "scope": "eq", "trust": 0.3, "vendor": "expat", "version": "2.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.5" }, { "model": "big-ip ltm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip asm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.28" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "19.0.1" }, { "model": "big-ip aam hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.4.4" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip asm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.66.204.442" }, { "model": "big-ip gtm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7.0.4" }, { "model": "websphere application server full profile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "big-ip websafe hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "14" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "31.1.0" }, { "model": "big-ip afm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "16.0.2" }, { "model": "big-ip link controller build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.40.1.256" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.4" }, { "model": "big-ip gtm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip link controller hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "solaris sru11.6", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "11.3" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip aam hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip afm", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.10" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip aam hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip afm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "big-ip websafe", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.512" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.0.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "35.0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.2" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7.0.6" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.0.3" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.1" }, { "model": "big-ip link controller hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip gtm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip asm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "23.0" }, { "model": "big-ip gtm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "netezza analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.15" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "24.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "32" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "18.0.1" }, { "model": "big-ip afm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.40.1.256" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip asm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "firefox", "scope": "ne", "trust": 0.3, "vendor": "mozilla", "version": "48" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "7.0" }, { "model": "big-ip asm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "6" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5.0.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "42" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.1.0.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "6.0.1" }, { "model": "big-ip dns hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.10" }, { "model": "big-ip analytics build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.66.204.442" }, { "model": "big-ip aam hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip link controller hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5.0.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "18.0" }, { "model": "big-ip analytics hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.14" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.12" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7.0.5" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.2" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "9.0" }, { "model": "big-ip gtm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.40.1.256" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "5.0.1" }, { "model": "big-ip aam build 685-hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.19" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.16" }, { "model": "big-ip gtm build 685-hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "22.04917" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "7" }, { "model": "big-ip afm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip asm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.01.14.628" }, { "model": "big-ip afm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.0.12" }, { "model": "big-ip websafe hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "37.0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "46" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.10" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7.0.2" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip aam hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "23.0.1" }, { "model": "big-ip asm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip aam hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "17.0.11" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "10.0.9" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.7" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "34.0.5" }, { "model": "big-ip pem hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip analytics hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "5.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "21.0" }, { "model": "big-ip gtm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip asm build 685-hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "39.0.3" }, { "model": "big-ip analytics hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "28.0.1" }, { "model": "big-ip pem hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "15.0.1" }, { "model": "big-ip websafe hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.18" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "25.0.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.8" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "31.6" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.020" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip link controller build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.66.204.442" }, { "model": "mac os security update", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x2016" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "45" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "39" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.2" }, { "model": "websphere application server liberty profile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "big-ip pem", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.2" }, { "model": "big-ip afm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.14" }, { "model": "big-ip dns hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "16" }, { "model": "big-ip asm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.110.104.180" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.2" }, { "model": "big-ip gtm hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.4" }, { "model": "big-ip asm hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip analytics build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.01.14.628" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.9" }, { "model": "big-ip afm hf9", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "1.5.0.10" }, { "model": "netezza analytics", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.2.3.0" }, { "model": "big-ip aam hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.8" }, { "model": "big-ip analytics hf9", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip websafe hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip asm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.4" }, { "model": "big-ip afm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.66.204.442" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.1" }, { "model": "big-ip analytics", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "13.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.3.0" }, { "model": "big-ip pem hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip aam hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.5.0.4" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" }, { "model": "big-ip aam hf9", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.1.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "34" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "13.0.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "2.0.0.21" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.11" }, { "model": "big-ip asm hf8", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip pem hf11", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip ltm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.5" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.21" }, { "model": "big-ip ltm hf10", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.9.3" }, { "model": "big-ip ltm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.6.16" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip pem hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0.0" }, { "model": "expat", "scope": "eq", "trust": 0.3, "vendor": "expat", "version": "2.1.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip websafe", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "big-ip websafe hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip pem hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "3.5.19" }, { "model": "big-ip pem hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.0" }, { "model": "big-ip gtm build", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.66.204.442" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "0.2" }, { "model": "big-ip afm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.3" }, { "model": "big-ip ltm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "firefox", "scope": "eq", "trust": 0.3, "vendor": "mozilla", "version": "29.0.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "12.1.2" } ], "sources": [ { "db": "BID", "id": "90729" }, { "db": "CNNVD", "id": "CNNVD-201605-455" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gustavo Grieco", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-455" } ], "trust": 0.6 }, "cve": "CVE-2016-0718", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2016-0718", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-88228", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2016-0718", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-0718", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-201605-455", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-88228", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-0718", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-88228" }, { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "CNNVD", "id": "CNNVD-201605-455" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow. Expat are prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. \nAttackers can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in denial-of-service conditions. Expat is a C language-based XML parser library developed by American software developer Jim Clark, which uses a stream-oriented parser. There is a security hole in Expat. \n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n+--------------------------+\npatches/packages/expat-2.2.0-i586-1_slack14.2.txz: Upgraded. \n This update fixes bugs and security issues:\n Multiple integer overflows in XML_GetBuffer. \n Fix crash on malformed input. \n Improve insufficient fix to CVE-2015-1283 / CVE-2015-2716. \n Use more entropy for hash initialization. \n Resolve troublesome internal call to srand. \n For more information, see:\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1283\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702\n (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/expat-2.2.0-i486-1_slack13.0.txz\n\nUpdated package for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/expat-2.2.0-x86_64-1_slack13.0.txz\n\nUpdated package for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/expat-2.2.0-i486-1_slack13.1.txz\n\nUpdated package for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/expat-2.2.0-x86_64-1_slack13.1.txz\n\nUpdated package for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/expat-2.2.0-i486-1_slack13.37.txz\n\nUpdated package for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/expat-2.2.0-x86_64-1_slack13.37.txz\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/expat-2.2.0-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/expat-2.2.0-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/expat-2.2.0-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/expat-2.2.0-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/expat-2.2.0-i586-1_slack14.2.txz\n\nUpdated package for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/expat-2.2.0-x86_64-1_slack14.2.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/expat-2.2.0-i586-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/expat-2.2.0-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 package:\nd042603604cda3dedb7a75cb049071c8 expat-2.2.0-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 package:\n4c57af80cc3ccd277a365f8053dabd9b expat-2.2.0-x86_64-1_slack13.0.txz\n\nSlackware 13.1 package:\n649682e89895159e90c0775f056a5b2a expat-2.2.0-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 package:\ndc109e48fb07db4aa47caa912308dcee expat-2.2.0-x86_64-1_slack13.1.txz\n\nSlackware 13.37 package:\na7893a356510073d213e08e6df41be6b expat-2.2.0-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 package:\n31f42e6ef7be259413659497f473b499 expat-2.2.0-x86_64-1_slack13.37.txz\n\nSlackware 14.0 package:\n3d5ab68ef82db833aa1b890372dfa789 expat-2.2.0-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n7ab4d2d05f4695904a4e164f6093ea38 expat-2.2.0-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\n3e9c111a338efb49ed9aa85322e7dfed expat-2.2.0-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\n5ec656840cad0813deeb632ef659d97b expat-2.2.0-x86_64-1_slack14.1.txz\n\nSlackware 14.2 package:\n770d5c370a923d7f1356bc81ceaaa3e9 expat-2.2.0-i586-1_slack14.2.txz\n\nSlackware x86_64 14.2 package:\n0b44169d48b17e181cddd25c547a0258 expat-2.2.0-x86_64-1_slack14.2.txz\n\nSlackware -current package:\nbc2d54deb510e5a41845207133fc1a75 l/expat-2.2.0-i586-1.txz\n\nSlackware x86_64 -current package:\n4bf858ad9d41159ce9fe624e47d58f21 l/expat-2.2.0-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg expat-2.2.0-i586-1_slack14.2.txz\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list: |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message: |\n| |\n| unsubscribe slackware-security |\n| |\n| You will get a confirmation message back containing instructions to |\n| complete the process. Please do not reply to this email address. \n=========================================================================\nUbuntu Security Notice USN-3044-1\nAugust 05, 2016\n\nfirefox vulnerabilities\n=========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nFirefox could be made to crash or run programs as your login if it\nopened a malicious website. \n\nSoftware Description:\n- firefox: Mozilla Open Source web browser\n\nDetails:\n\nGustavo Grieco discovered an out-of-bounds read during XML parsing in\nsome circumstances. \n\n(CVE-2016-0718)\n\nToni Huttunen discovered that once a favicon is requested from a site,\nthe remote server can keep the network connection open even after the pag\ne\nis closed. A remote attacked could potentially exploit this to track\nusers, resulting in information disclosure. (CVE-2016-2830)\n\nChristian Holler, Tyson Smith, Boris Zbarsky, Byron Campen, Julian Seward\n,\nCarsten Book, Gary Kwong, Jesse Ruderman, Andrew McCreight, and Phil\nRingnalda discovered multiple memory safety issues in Firefox. (CVE-2016-2835, CVE-2016-2836)\n\nA buffer overflow was discovered in the ClearKey Content Decryption\nModule (CDM) during video playback. (CVE-2016-2837)\n\nAtte Kettunen discovered a buffer overflow when rendering SVG content in\nsome circumstances. \n(CVE-2016-2838)\n\nBert Massop discovered a crash in Cairo with version 0.10 of FFmpeg. (CVE-2016-2839)\n\n\nCatalin Dumitru discovered that URLs of resources loaded after a\nnavigation start could be leaked to the following page via the Resource\nTiming API. An attacker could potentially exploit this to obtain sensitiv\ne\ninformation. (CVE-2016-5250)\n\nFiras Salem discovered an issue with non-ASCII and emoji characters in\ndata: URLs. An attacker could potentially exploit this to spoof the\naddressbar contents. (CVE-2016-5251)\n\nGeorg Koppen discovered a stack buffer underflow during 2D graphics\nrendering in some circumstances. (CVE-2016-5252)\n\nAbhishek Arya discovered a use-after-free when the alt key is used with\ntop-level menus. (CVE-2016-5254)\n\n\nJukka Jyl=C3=A4nki discovered a crash during garbage collection. (CVE-2016-5255)\n\nLooben Yang discovered a use-after-free in WebRTC. (CVE-2016-5258)\n\nLooben Yang discovered a use-after-free when working with nested sync\nevents in service workers. (CVE-2016-5259)\n\nMike Kaply discovered that plain-text passwords can be stored in session\nrestore if an input field type is changed from \"password\" to \"text\" durin\ng\na session, leading to information disclosure. (CVE-2016-5260)\n\nSamuel Gro=C3=9F discovered an integer overflow in WebSockets during data\n\nbuffering in some circumstances. (CVE-2016-5261)\n\nNikita Arykov discovered that JavaScript event handlers on a \u003cmarquee\u003e\nelement can execute in a sandboxed iframe without the allow-scripts flag\nset. If a user were tricked in to opening a specially crafted website, an\n\nattacker could potentially exploit this to conduct cross-site scripting\n(XSS) attacks. (CVE-2016-5262)\n\nA type confusion bug was discovered in display transformation during\nrendering. (CVE-2016-5263)\n\n\nA use-after-free was discovered when applying effects to SVG elements in\nsome circumstances. \n(CVE-2016-5264)\n\nAbdulrahman Alqabandi discovered a same-origin policy violation relating\nto local HTML files and saved shortcut files. An attacker could\npotentially exploit this to obtain sensitive information. (CVE-2016-5265)\n\n\nRafael Gieschke discovered an information disclosure issue related to\ndrag and drop. An attacker could potentially exploit this to obtain\nsensitive information. (CVE-2016-5266)\n\nA text injection issue was discovered with about: URLs. An attacker could\n\npotentially exploit this to spoof internal error pages. (CVE-2016-5268)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 16.04 LTS:\n firefox 48.0+build2-0ubuntu0.16.04.1\n\nUbuntu 14.04 LTS:\n firefox 48.0+build2-0ubuntu0.14.04.1\n\nUbuntu 12.04 LTS:\n firefox 48.0+build2-0ubuntu0.12.04.1\n\nAfter a standard system update you need to restart Firefox to make\nall the necessary changes. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: expat security update\nAdvisory ID: RHSA-2016:2824-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2016-2824.html\nIssue date: 2016-11-28\nCVE Names: CVE-2016-0718 \n=====================================================================\n\n1. Summary:\n\nAn update for expat is now available for Red Hat Enterprise Linux 6 and Red\nHat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nExpat is a C library for parsing XML documents. \n\nSecurity Fix(es):\n\n* An out-of-bounds read flaw was found in the way Expat processed certain\ninput. (CVE-2016-0718)\n\nRed Hat would like to thank Gustavo Grieco for reporting this issue. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, applications using the Expat library\nmust be restarted for the update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1296102 - CVE-2016-0718 expat: Out-of-bounds heap read on crafted input causing crash\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nexpat-2.0.1-13.el6_8.src.rpm\n\ni386:\nexpat-2.0.1-13.el6_8.i686.rpm\nexpat-debuginfo-2.0.1-13.el6_8.i686.rpm\n\nx86_64:\nexpat-2.0.1-13.el6_8.i686.rpm\nexpat-2.0.1-13.el6_8.x86_64.rpm\nexpat-debuginfo-2.0.1-13.el6_8.i686.rpm\nexpat-debuginfo-2.0.1-13.el6_8.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nexpat-debuginfo-2.0.1-13.el6_8.i686.rpm\nexpat-devel-2.0.1-13.el6_8.i686.rpm\n\nx86_64:\nexpat-debuginfo-2.0.1-13.el6_8.i686.rpm\nexpat-debuginfo-2.0.1-13.el6_8.x86_64.rpm\nexpat-devel-2.0.1-13.el6_8.i686.rpm\nexpat-devel-2.0.1-13.el6_8.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nexpat-2.0.1-13.el6_8.src.rpm\n\nx86_64:\nexpat-2.0.1-13.el6_8.i686.rpm\nexpat-2.0.1-13.el6_8.x86_64.rpm\nexpat-debuginfo-2.0.1-13.el6_8.i686.rpm\nexpat-debuginfo-2.0.1-13.el6_8.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nexpat-debuginfo-2.0.1-13.el6_8.i686.rpm\nexpat-debuginfo-2.0.1-13.el6_8.x86_64.rpm\nexpat-devel-2.0.1-13.el6_8.i686.rpm\nexpat-devel-2.0.1-13.el6_8.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nexpat-2.0.1-13.el6_8.src.rpm\n\ni386:\nexpat-2.0.1-13.el6_8.i686.rpm\nexpat-debuginfo-2.0.1-13.el6_8.i686.rpm\nexpat-devel-2.0.1-13.el6_8.i686.rpm\n\nppc64:\nexpat-2.0.1-13.el6_8.ppc.rpm\nexpat-2.0.1-13.el6_8.ppc64.rpm\nexpat-debuginfo-2.0.1-13.el6_8.ppc.rpm\nexpat-debuginfo-2.0.1-13.el6_8.ppc64.rpm\nexpat-devel-2.0.1-13.el6_8.ppc.rpm\nexpat-devel-2.0.1-13.el6_8.ppc64.rpm\n\ns390x:\nexpat-2.0.1-13.el6_8.s390.rpm\nexpat-2.0.1-13.el6_8.s390x.rpm\nexpat-debuginfo-2.0.1-13.el6_8.s390.rpm\nexpat-debuginfo-2.0.1-13.el6_8.s390x.rpm\nexpat-devel-2.0.1-13.el6_8.s390.rpm\nexpat-devel-2.0.1-13.el6_8.s390x.rpm\n\nx86_64:\nexpat-2.0.1-13.el6_8.i686.rpm\nexpat-2.0.1-13.el6_8.x86_64.rpm\nexpat-debuginfo-2.0.1-13.el6_8.i686.rpm\nexpat-debuginfo-2.0.1-13.el6_8.x86_64.rpm\nexpat-devel-2.0.1-13.el6_8.i686.rpm\nexpat-devel-2.0.1-13.el6_8.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nexpat-2.0.1-13.el6_8.src.rpm\n\ni386:\nexpat-2.0.1-13.el6_8.i686.rpm\nexpat-debuginfo-2.0.1-13.el6_8.i686.rpm\nexpat-devel-2.0.1-13.el6_8.i686.rpm\n\nx86_64:\nexpat-2.0.1-13.el6_8.i686.rpm\nexpat-2.0.1-13.el6_8.x86_64.rpm\nexpat-debuginfo-2.0.1-13.el6_8.i686.rpm\nexpat-debuginfo-2.0.1-13.el6_8.x86_64.rpm\nexpat-devel-2.0.1-13.el6_8.i686.rpm\nexpat-devel-2.0.1-13.el6_8.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nexpat-2.1.0-10.el7_3.src.rpm\n\nx86_64:\nexpat-2.1.0-10.el7_3.i686.rpm\nexpat-2.1.0-10.el7_3.x86_64.rpm\nexpat-debuginfo-2.1.0-10.el7_3.i686.rpm\nexpat-debuginfo-2.1.0-10.el7_3.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nexpat-debuginfo-2.1.0-10.el7_3.i686.rpm\nexpat-debuginfo-2.1.0-10.el7_3.x86_64.rpm\nexpat-devel-2.1.0-10.el7_3.i686.rpm\nexpat-devel-2.1.0-10.el7_3.x86_64.rpm\nexpat-static-2.1.0-10.el7_3.i686.rpm\nexpat-static-2.1.0-10.el7_3.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nexpat-2.1.0-10.el7_3.src.rpm\n\nx86_64:\nexpat-2.1.0-10.el7_3.i686.rpm\nexpat-2.1.0-10.el7_3.x86_64.rpm\nexpat-debuginfo-2.1.0-10.el7_3.i686.rpm\nexpat-debuginfo-2.1.0-10.el7_3.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nexpat-debuginfo-2.1.0-10.el7_3.i686.rpm\nexpat-debuginfo-2.1.0-10.el7_3.x86_64.rpm\nexpat-devel-2.1.0-10.el7_3.i686.rpm\nexpat-devel-2.1.0-10.el7_3.x86_64.rpm\nexpat-static-2.1.0-10.el7_3.i686.rpm\nexpat-static-2.1.0-10.el7_3.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nexpat-2.1.0-10.el7_3.src.rpm\n\naarch64:\nexpat-2.1.0-10.el7_3.aarch64.rpm\nexpat-debuginfo-2.1.0-10.el7_3.aarch64.rpm\nexpat-devel-2.1.0-10.el7_3.aarch64.rpm\n\nppc64:\nexpat-2.1.0-10.el7_3.ppc.rpm\nexpat-2.1.0-10.el7_3.ppc64.rpm\nexpat-debuginfo-2.1.0-10.el7_3.ppc.rpm\nexpat-debuginfo-2.1.0-10.el7_3.ppc64.rpm\nexpat-devel-2.1.0-10.el7_3.ppc.rpm\nexpat-devel-2.1.0-10.el7_3.ppc64.rpm\n\nppc64le:\nexpat-2.1.0-10.el7_3.ppc64le.rpm\nexpat-debuginfo-2.1.0-10.el7_3.ppc64le.rpm\nexpat-devel-2.1.0-10.el7_3.ppc64le.rpm\n\ns390x:\nexpat-2.1.0-10.el7_3.s390.rpm\nexpat-2.1.0-10.el7_3.s390x.rpm\nexpat-debuginfo-2.1.0-10.el7_3.s390.rpm\nexpat-debuginfo-2.1.0-10.el7_3.s390x.rpm\nexpat-devel-2.1.0-10.el7_3.s390.rpm\nexpat-devel-2.1.0-10.el7_3.s390x.rpm\n\nx86_64:\nexpat-2.1.0-10.el7_3.i686.rpm\nexpat-2.1.0-10.el7_3.x86_64.rpm\nexpat-debuginfo-2.1.0-10.el7_3.i686.rpm\nexpat-debuginfo-2.1.0-10.el7_3.x86_64.rpm\nexpat-devel-2.1.0-10.el7_3.i686.rpm\nexpat-devel-2.1.0-10.el7_3.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\naarch64:\nexpat-debuginfo-2.1.0-10.el7_3.aarch64.rpm\nexpat-static-2.1.0-10.el7_3.aarch64.rpm\n\nppc64:\nexpat-debuginfo-2.1.0-10.el7_3.ppc.rpm\nexpat-debuginfo-2.1.0-10.el7_3.ppc64.rpm\nexpat-static-2.1.0-10.el7_3.ppc.rpm\nexpat-static-2.1.0-10.el7_3.ppc64.rpm\n\nppc64le:\nexpat-debuginfo-2.1.0-10.el7_3.ppc64le.rpm\nexpat-static-2.1.0-10.el7_3.ppc64le.rpm\n\ns390x:\nexpat-debuginfo-2.1.0-10.el7_3.s390.rpm\nexpat-debuginfo-2.1.0-10.el7_3.s390x.rpm\nexpat-static-2.1.0-10.el7_3.s390.rpm\nexpat-static-2.1.0-10.el7_3.s390x.rpm\n\nx86_64:\nexpat-debuginfo-2.1.0-10.el7_3.i686.rpm\nexpat-debuginfo-2.1.0-10.el7_3.x86_64.rpm\nexpat-static-2.1.0-10.el7_3.i686.rpm\nexpat-static-2.1.0-10.el7_3.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nexpat-2.1.0-10.el7_3.src.rpm\n\nx86_64:\nexpat-2.1.0-10.el7_3.i686.rpm\nexpat-2.1.0-10.el7_3.x86_64.rpm\nexpat-debuginfo-2.1.0-10.el7_3.i686.rpm\nexpat-debuginfo-2.1.0-10.el7_3.x86_64.rpm\nexpat-devel-2.1.0-10.el7_3.i686.rpm\nexpat-devel-2.1.0-10.el7_3.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nexpat-debuginfo-2.1.0-10.el7_3.i686.rpm\nexpat-debuginfo-2.1.0-10.el7_3.x86_64.rpm\nexpat-static-2.1.0-10.el7_3.i686.rpm\nexpat-static-2.1.0-10.el7_3.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-0718\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2016 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFYPIyBXlSAg2UNWIIRAmHXAJ0XmPOxvAJOT6/eusxHQBKBs/LPDgCguirS\nH8Bczzxw4Aj5YxGpyacoQBE=\n=GbHX\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201701-21\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Expat: Multiple vulnerabilities\n Date: January 11, 2017\n Bugs: #458742, #555642, #577928, #583268, #585510\n ID: 201701-21\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Expat, the worst of which\nmay allow execution of arbitrary code. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 dev-libs/expat \u003c 2.2.0-r1 \u003e= 2.2.0-r1\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Expat. Please review\nthe CVE identifiers referenced below for details. This attack could also\nbe used against automated systems that arbitrarily process XML files. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Expat users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-libs/expat-2.2.0-r1\"\n\nReferences\n==========\n\n[ 1 ] CVE-2012-6702\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6702\n[ 2 ] CVE-2013-0340\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0340\n[ 3 ] CVE-2015-1283\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1283\n[ 4 ] CVE-2016-0718\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0718\n[ 5 ] CVE-2016-4472\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4472\n[ 6 ] CVE-2016-5300\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5300\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201701-21\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2017 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2017-03-28-2 Additional information for\nAPPLE-SA-2017-03-22-1 iTunes for Windows 12.6\n\niTunes for Windows 12.6 addresses the following:\n\nAPNs Server\nAvailable for: Windows 7 and later\nImpact: An attacker in a privileged network position can track a\nuser\u0027s activity\nDescription: A client certificate was sent in plaintext. This issue\nwas addressed through improved certificate handling. \nCVE-2017-2383: Matthias Wachs and Quirin Scheitle of Technical\nUniversity Munich (TUM)\nEntry added March 28, 2017\n\niTunes\nAvailable for: Windows 7 and later\nImpact: Multiple issues in SQLite\nDescription: Multiple issues existed in SQLite. These issues were\naddressed by updating SQLite to version 3.15.2. These issues were\naddressed by updating expat to version 2.2.0. \nCVE-2009-3270\nCVE-2009-3560\nCVE-2009-3720\nCVE-2012-1147\nCVE-2012-1148\nCVE-2012-6702\nCVE-2015-1283\nCVE-2016-0718\nCVE-2016-4472\nCVE-2016-5300\n\nlibxslt\nAvailable for: Windows 7 and later\nImpact: Multiple vulnerabilities in libxslt\nDescription: Multiple memory corruption issues were addressed through\nimproved memory handling. \nCVE-2017-5029: Holger Fuhrmannek\nEntry added March 28, 2017\n\nWebKit\nAvailable for: Windows 7 and later\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues were addressed through\nimproved memory handling. \nCVE-2017-2463: Kai Kang (4B5F5F4B) of Tencent\u0027s Xuanwu Lab\n(tencent.com) working with Trend Micro\u0027s Zero Day Initiative\nEntry added March 28, 2017\n\nWebKit\nAvailable for: Windows 7 and later\nImpact: Processing maliciously crafted web content may exfiltrate\ndata cross-origin\nDescription: A validation issue existed in element handling. This\nissue was addressed through improved validation. \nCVE-2017-2479: lokihardt of Google Project Zero\nCVE-2017-2480: lokihardt of Google Project Zero\nEntry added March 28, 2017\n\nInstallation note:\n\niTunes for Windows 12.6 may be obtained from:\nhttps://www.apple.com/itunes/download/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - http://gpgtools.org\n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\nVkUmhXDNi0csm+QTi7ZP\n=hPjT\n-----END PGP SIGNATURE-----\n\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3582-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nMay 18, 2016 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : expat\nCVE ID : CVE-2016-0718\n\nGustavo Grieco discovered that Expat, an XML parsing C library, does not\nproperly handle certain kinds of malformed input documents, resulting in\nbuffer overflows during processing and error reporting. \n\nFor the stable distribution (jessie), this problem has been fixed in\nversion 2.1.0-6+deb8u2. Additionally this update refreshes the fix for\nCVE-2015-1283 to avoid relying on undefined behavior. \n\nWe recommend that you upgrade your expat packages", "sources": [ { "db": "NVD", "id": "CVE-2016-0718" }, { "db": "BID", "id": "90729" }, { "db": "VULHUB", "id": "VHN-88228" }, { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "PACKETSTORM", "id": "140275" }, { "db": "PACKETSTORM", "id": "138181" }, { "db": "PACKETSTORM", "id": "139908" }, { "db": "PACKETSTORM", "id": "141796" }, { "db": "PACKETSTORM", "id": "140431" }, { "db": "PACKETSTORM", "id": "141937" }, { "db": "PACKETSTORM", "id": "137108" } ], "trust": 1.98 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-88228", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-88228" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-0718", "trust": 2.8 }, { "db": "BID", "id": "90729", "trust": 2.1 }, { "db": "SECTRACK", "id": "1036348", "trust": 1.8 }, { "db": "SECTRACK", "id": "1037705", "trust": 1.8 }, { "db": "SECTRACK", "id": "1036415", "trust": 1.8 }, { "db": "PACKETSTORM", "id": "141350", "trust": 1.8 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2016/05/17/12", "trust": 1.8 }, { "db": "TENABLE", "id": "TNS-2016-20", "trust": 1.8 }, { "db": "MCAFEE", "id": "SB10365", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-201605-455", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.0699", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2593", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "139908", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "138181", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "137108", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "137109", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148973", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-88228", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-0718", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "140275", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "141796", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "140431", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "141937", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-88228" }, { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "BID", "id": "90729" }, { "db": "PACKETSTORM", "id": "140275" }, { "db": "PACKETSTORM", "id": "138181" }, { "db": "PACKETSTORM", "id": "139908" }, { "db": "PACKETSTORM", "id": "141796" }, { "db": "PACKETSTORM", "id": "140431" }, { "db": "PACKETSTORM", "id": "141937" }, { "db": "PACKETSTORM", "id": "137108" }, { "db": "CNNVD", "id": "CNNVD-201605-455" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "id": "VAR-201605-0145", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-88228" } ], "trust": 0.5500729599999999 }, "last_update_date": "2024-09-19T22:24:08.063000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Expat Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=61769" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2017/02/28/eset_antivirus_opens_macs_to_remote_execution_as_root/" }, { "title": "Red Hat: Moderate: expat security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20162824 - Security Advisory" }, { "title": "Ubuntu Security Notice: expat vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2983-1" }, { "title": "Mozilla: Mozilla Foundation Security Advisory 2016-68", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories\u0026qid=2016-68" }, { "title": "Mozilla: Out-of-bounds read during XML parsing in Expat library", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=mozilla_advisories\u0026qid=ed80349726dbf716de7cec0c272ec473" }, { "title": "Amazon Linux AMI: ALAS-2016-775", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2016-775" }, { "title": "Ubuntu Security Notice: xmlrpc-c vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3013-1" }, { "title": "Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182486 - Security Advisory" }, { "title": "Tenable Security Advisories: [R5] Nessus 6.8 Fixes Multiple Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=TNS-2016-11" }, { "title": "Ubuntu Security Notice: firefox vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3044-1" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=ac5af5dd99788925425f5747ec672707" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=5f8c525f1408011628af1792207b2099" }, { "title": "Android Security Bulletins: Android Security Bulletin\u2014November 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins\u0026qid=29d79db4a6421689e55b5a9ce5d2aa60" }, { "title": "Tenable Security Advisories: [R3] PVS 5.2.0 Fixes Multiple Third-party Library Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=TNS-2016-20" }, { "title": "Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - October 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins\u0026qid=21c0efa2643d707e2f50a501209eb75c" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=13f3551b67d913fba90df4b2c0dae0bf" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=ec6577109e640dac19a6ddb978afe82d" }, { "title": "afl-cve", "trust": 0.1, "url": "https://github.com/mrash/afl-cve " }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/google-security-researcher-finds-security-hole-in-esets-mac-antivirus/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "CNNVD", "id": "CNNVD-201605-455" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-88228" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://www.debian.org/security/2016/dsa-3582" }, { "trust": 2.1, "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "trust": 2.1, "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/90729" }, { "trust": 1.9, "url": "https://security.gentoo.org/glsa/201701-21" }, { "trust": 1.9, "url": "http://rhn.redhat.com/errata/rhsa-2016-2824.html" }, { "trust": 1.9, "url": "http://www.ubuntu.com/usn/usn-3044-1" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1036348" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1036415" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1037705" }, { "trust": 1.8, "url": "http://seclists.org/fulldisclosure/2017/feb/68" }, { "trust": 1.8, "url": "http://lists.apple.com/archives/security-announce/2016/jul/msg00000.html" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2018:2486" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-2983-1" }, { "trust": 1.8, "url": "http://www.openwall.com/lists/oss-security/2016/05/17/12" }, { "trust": 1.8, "url": "http://packetstormsecurity.com/files/141350/eset-endpoint-antivirus-6-remote-code-execution.html" }, { "trust": 1.8, "url": "http://support.eset.com/ca6333/" }, { "trust": 1.8, "url": "http://www.mozilla.org/security/announce/2016/mfsa2016-68.html" }, { "trust": 1.8, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "trust": 1.8, "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1236923" }, { "trust": 1.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296102" }, { "trust": 1.8, "url": "https://support.apple.com/ht206903" }, { "trust": 1.8, "url": "https://www.tenable.com/security/tns-2016-20" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html" }, { "trust": 1.8, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html" }, { "trust": 1.7, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10365" }, { "trust": 0.7, "url": "https://access.redhat.com/errata/rhsa-2016:2824" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0718" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2016-0718" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2593" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0699/" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-6702" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5300" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1283" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4472" }, { "trust": 0.3, "url": "http://expat.sourceforge.net/" }, { "trust": 0.3, "url": "http://seclists.org/oss-sec/2016/q2/360" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024076" }, { "trust": 0.3, "url": "https://support.f5.com/csp/article/k52320548" }, { "trust": 0.3, "url": "https://www.mozilla.org/en-us/security/advisories/mfsa2016-68/" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21989336" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21992933" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988026" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988710" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21994401" }, { "trust": 0.2, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.2, "url": "https://gpgtools.org" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3720" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6153" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3415" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3270" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-6607" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3560" }, { "trust": 0.2, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3416" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3717" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3414" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-7443" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1148" }, { "trust": 0.2, "url": "https://www.apple.com/itunes/download/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1147" }, { "trust": 0.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10365" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2983-1/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=53129" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1283" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-5300" }, { "trust": 0.1, "url": "http://slackware.com" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0718" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4472" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-6702" }, { "trust": 0.1, "url": "http://osuosl.org)" }, { "trust": 0.1, "url": "http://slackware.com/gpg-key" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5252" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5250" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2837" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5251" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5261" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2836" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5264" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5258" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5260" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5265" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2835" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5268" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2830" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2839" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5266" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5255" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/firefox/48.0+build2-0ubuntu0.16.04" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/firefox/48.0+build2-0ubuntu0.14.04" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/firefox/48.0+build2-0ubuntu0.12.04" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5262" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5259" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5263" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5254" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2838" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0340" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-0340" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6702" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5300" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1283" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-0718" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4472" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2480" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5029" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2479" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2383" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2463" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" } ], "sources": [ { "db": "VULHUB", "id": "VHN-88228" }, { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "BID", "id": "90729" }, { "db": "PACKETSTORM", "id": "140275" }, { "db": "PACKETSTORM", "id": "138181" }, { "db": "PACKETSTORM", "id": "139908" }, { "db": "PACKETSTORM", "id": "141796" }, { "db": "PACKETSTORM", "id": "140431" }, { "db": "PACKETSTORM", "id": "141937" }, { "db": "PACKETSTORM", "id": "137108" }, { "db": "CNNVD", "id": "CNNVD-201605-455" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-88228" }, { "db": "VULMON", "id": "CVE-2016-0718" }, { "db": "BID", "id": "90729" }, { "db": "PACKETSTORM", "id": "140275" }, { "db": "PACKETSTORM", "id": "138181" }, { "db": "PACKETSTORM", "id": "139908" }, { "db": "PACKETSTORM", "id": "141796" }, { "db": "PACKETSTORM", "id": "140431" }, { "db": "PACKETSTORM", "id": "141937" }, { "db": "PACKETSTORM", "id": "137108" }, { "db": "CNNVD", "id": "CNNVD-201605-455" }, { "db": "NVD", "id": "CVE-2016-0718" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-26T00:00:00", "db": "VULHUB", "id": "VHN-88228" }, { "date": "2016-05-26T00:00:00", "db": "VULMON", "id": "CVE-2016-0718" }, { "date": "2016-05-18T00:00:00", "db": "BID", "id": "90729" }, { "date": "2016-12-25T13:15:00", "db": "PACKETSTORM", "id": "140275" }, { "date": "2016-08-05T22:46:55", "db": "PACKETSTORM", "id": "138181" }, { "date": "2016-11-28T21:04:32", "db": "PACKETSTORM", "id": "139908" }, { "date": "2017-03-23T16:22:29", "db": "PACKETSTORM", "id": "141796" }, { "date": "2017-01-11T18:55:11", "db": "PACKETSTORM", "id": "140431" }, { "date": "2017-03-28T23:44:44", "db": "PACKETSTORM", "id": "141937" }, { "date": "2016-05-18T15:47:12", "db": "PACKETSTORM", "id": "137108" }, { "date": "2016-05-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-455" }, { "date": "2016-05-26T16:59:00.133000", "db": "NVD", "id": "CVE-2016-0718" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-12T00:00:00", "db": "VULHUB", "id": "VHN-88228" }, { "date": "2023-02-12T00:00:00", "db": "VULMON", "id": "CVE-2016-0718" }, { "date": "2017-09-25T20:00:00", "db": "BID", "id": "90729" }, { "date": "2023-04-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201605-455" }, { "date": "2023-02-12T23:15:50.093000", "db": "NVD", "id": "CVE-2016-0718" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "138181" }, { "db": "PACKETSTORM", "id": "139908" }, { "db": "PACKETSTORM", "id": "137108" }, { "db": "CNNVD", "id": "CNNVD-201605-455" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Expat Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-455" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201605-455" } ], "trust": 0.6 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.