Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2005-0469
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:13:54.320Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-731", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.de/security/2005/dsa-731" }, { "name": "20050405-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P" }, { "name": "12918", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12918" }, { "name": "USN-224-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntulinux.org/usn/usn-224-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt" }, { "name": "57755", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1" }, { "name": "oval:org.mitre.oval:def:9708", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708" }, { "name": "DSA-703", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-703" }, { "name": "101665", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1" }, { "name": "DSA-699", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-699" }, { "name": "MDKSA-2005:061", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:061" }, { "name": "14745", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14745" }, { "name": "RHSA-2005:327", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-327.html" }, { "name": "20050328 Multiple Telnet Client slc_add_reply() Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://www.idefense.com/application/poi/display?id=220\u0026type=vulnerabilities" }, { "name": "FreeBSD-SA-05:01.telnet", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc" }, { "name": "GLSA-200503-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml" }, { "name": "RHSA-2005:330", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-330.html" }, { "name": "DSA-697", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-697" }, { "name": "57761", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1" }, { "name": "VU#291924", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/291924" }, { "name": "101671", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1" }, { "name": "17899", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17899" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-731", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.de/security/2005/dsa-731" }, { "name": "20050405-01-P", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P" }, { "name": "12918", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12918" }, { "name": "USN-224-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntulinux.org/usn/usn-224-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt" }, { "name": "57755", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1" }, { "name": "oval:org.mitre.oval:def:9708", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708" }, { "name": "DSA-703", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-703" }, { "name": "101665", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1" }, { "name": "DSA-699", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-699" }, { "name": "MDKSA-2005:061", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:061" }, { "name": "14745", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14745" }, { "name": "RHSA-2005:327", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-327.html" }, { "name": "20050328 Multiple Telnet Client slc_add_reply() Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://www.idefense.com/application/poi/display?id=220\u0026type=vulnerabilities" }, { "name": "FreeBSD-SA-05:01.telnet", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc" }, { "name": "GLSA-200503-36", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml" }, { "name": "RHSA-2005:330", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-330.html" }, { "name": "DSA-697", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-697" }, { "name": "57761", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1" }, { "name": "VU#291924", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/291924" }, { "name": "101671", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1" }, { "name": "17899", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17899" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0469", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-731", "refsource": "DEBIAN", "url": "http://www.debian.de/security/2005/dsa-731" }, { "name": "20050405-01-P", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P" }, { "name": "12918", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12918" }, { "name": "USN-224-1", "refsource": "UBUNTU", "url": "http://www.ubuntulinux.org/usn/usn-224-1" }, { "name": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt", "refsource": "CONFIRM", "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt" }, { "name": "57755", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1" }, { "name": "oval:org.mitre.oval:def:9708", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708" }, { "name": "DSA-703", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-703" }, { "name": "101665", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1" }, { "name": "DSA-699", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-699" }, { "name": "MDKSA-2005:061", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:061" }, { "name": "14745", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14745" }, { "name": "RHSA-2005:327", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-327.html" }, { "name": "20050328 Multiple Telnet Client slc_add_reply() Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=220\u0026type=vulnerabilities" }, { "name": "FreeBSD-SA-05:01.telnet", "refsource": "FREEBSD", "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc" }, { "name": "GLSA-200503-36", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml" }, { "name": "RHSA-2005:330", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-330.html" }, { "name": "DSA-697", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-697" }, { "name": "57761", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1" }, { "name": "VU#291924", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/291924" }, { "name": "101671", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1" }, { "name": "17899", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17899" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0469", "datePublished": "2005-03-28T05:00:00", "dateReserved": "2005-02-18T00:00:00", "dateUpdated": "2024-08-07T21:13:54.320Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2005-0469\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-05-02T04:00:00.000\",\"lastModified\":\"2024-11-20T23:55:11.663\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":true,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ncsa:telnet:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CA584DD-D936-4EA3-A6E6-D39763480191\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/14745\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/17899\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.de/security/2005/dsa-731\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2005/dsa-697\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2005/dsa-699\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2005/dsa-703\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.idefense.com/application/poi/display?id=220\u0026type=vulnerabilities\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/291924\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:061\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-327.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-330.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/12918\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntulinux.org/usn/usn-224-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/14745\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17899\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.de/security/2005/dsa-731\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2005/dsa-697\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2005/dsa-699\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2005/dsa-703\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.idefense.com/application/poi/display?id=220\u0026type=vulnerabilities\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/291924\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:061\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-327.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-330.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/12918\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntulinux.org/usn/usn-224-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.\",\"lastModified\":\"2007-03-14T00:00:00\"}]}}" } }
rhsa-2005_327
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated telnet packages that fix two buffer overflow vulnerabilities are\nnow available.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The telnet package provides a command line telnet client. The telnet-server\npackage includes a telnet daemon, telnetd, that supports remote login to\nthe host machine.\n\nTwo buffer overflow flaws were discovered in the way the telnet client\nhandles messages from a server. An attacker may be able to execute\narbitrary code on a victim\u0027s machine if the victim can be tricked into\nconnecting to a malicious telnet server. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the names CAN-2005-0468\nand CAN-2005-0469 to these issues.\n\nAdditionally, the following bugs have been fixed in these erratum packages\nfor Red Hat Enterprise Linux 2.1 and Red Hat Enterprise Linux 3:\n\n- telnetd could loop on an error in the child side process\n\n- There was a race condition in telnetd on a wtmp lock on some occasions\n\n- The command line in the process table was sometimes too long and caused\nbad output from the ps command\n\n- The 8-bit binary option was not working\n\nUsers of telnet should upgrade to this updated package, which contains\nbackported patches to correct these issues.\n\nRed Hat would like to thank iDEFENSE for their responsible disclosure of\nthis issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:327", "url": "https://access.redhat.com/errata/RHSA-2005:327" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://www.idefense.com/application/poi/display?id=220\u0026type=vulnerabilities", "url": "http://www.idefense.com/application/poi/display?id=220\u0026type=vulnerabilities" }, { "category": "external", "summary": "http://www.idefense.com/application/poi/display?id=221\u0026type=vulnerabilities", "url": "http://www.idefense.com/application/poi/display?id=221\u0026type=vulnerabilities" }, { "category": "external", "summary": "126858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=126858" }, { "category": "external", "summary": "145004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=145004" }, { "category": "external", "summary": "145636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=145636" }, { "category": "external", "summary": "147003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=147003" }, { "category": "external", "summary": "151297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151297" }, { "category": "external", "summary": "151301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151301" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_327.json" } ], "title": "Red Hat Security Advisory: telnet security update", "tracking": { "current_release_date": "2024-11-21T23:36:27+00:00", "generator": { "date": "2024-11-21T23:36:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:327", "initial_release_date": "2005-03-28T19:49:00+00:00", "revision_history": [ { "date": "2005-03-28T19:49:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-03-28T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:36:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "telnet-1:0.17-26.EL3.2.ia64", "product": { "name": "telnet-1:0.17-26.EL3.2.ia64", "product_id": "telnet-1:0.17-26.EL3.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet@0.17-26.EL3.2?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-server-1:0.17-26.EL3.2.ia64", "product": { "name": "telnet-server-1:0.17-26.EL3.2.ia64", "product_id": "telnet-server-1:0.17-26.EL3.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-server@0.17-26.EL3.2?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-debuginfo-1:0.17-26.EL3.2.ia64", "product": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.ia64", "product_id": "telnet-debuginfo-1:0.17-26.EL3.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-debuginfo@0.17-26.EL3.2?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-1:0.17-31.EL4.2.ia64", "product": { "name": "telnet-1:0.17-31.EL4.2.ia64", "product_id": "telnet-1:0.17-31.EL4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet@0.17-31.EL4.2?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-server-1:0.17-31.EL4.2.ia64", "product": { "name": "telnet-server-1:0.17-31.EL4.2.ia64", "product_id": "telnet-server-1:0.17-31.EL4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-server@0.17-31.EL4.2?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-debuginfo-1:0.17-31.EL4.2.ia64", "product": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.ia64", "product_id": "telnet-debuginfo-1:0.17-31.EL4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-debuginfo@0.17-31.EL4.2?arch=ia64\u0026epoch=1" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "telnet-1:0.17-26.EL3.2.src", "product": { "name": "telnet-1:0.17-26.EL3.2.src", "product_id": "telnet-1:0.17-26.EL3.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet@0.17-26.EL3.2?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-1:0.17-31.EL4.2.src", "product": { "name": "telnet-1:0.17-31.EL4.2.src", "product_id": "telnet-1:0.17-31.EL4.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet@0.17-31.EL4.2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "telnet-1:0.17-26.EL3.2.x86_64", "product": { "name": "telnet-1:0.17-26.EL3.2.x86_64", "product_id": "telnet-1:0.17-26.EL3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet@0.17-26.EL3.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-server-1:0.17-26.EL3.2.x86_64", "product": { "name": "telnet-server-1:0.17-26.EL3.2.x86_64", "product_id": "telnet-server-1:0.17-26.EL3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-server@0.17-26.EL3.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "product": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "product_id": "telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-debuginfo@0.17-26.EL3.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-1:0.17-31.EL4.2.x86_64", "product": { "name": "telnet-1:0.17-31.EL4.2.x86_64", "product_id": "telnet-1:0.17-31.EL4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet@0.17-31.EL4.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-server-1:0.17-31.EL4.2.x86_64", "product": { "name": "telnet-server-1:0.17-31.EL4.2.x86_64", "product_id": "telnet-server-1:0.17-31.EL4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-server@0.17-31.EL4.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "product": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "product_id": "telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-debuginfo@0.17-31.EL4.2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "telnet-1:0.17-26.EL3.2.i386", "product": { "name": "telnet-1:0.17-26.EL3.2.i386", "product_id": "telnet-1:0.17-26.EL3.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet@0.17-26.EL3.2?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-server-1:0.17-26.EL3.2.i386", "product": { "name": "telnet-server-1:0.17-26.EL3.2.i386", "product_id": "telnet-server-1:0.17-26.EL3.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-server@0.17-26.EL3.2?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-debuginfo-1:0.17-26.EL3.2.i386", "product": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.i386", "product_id": "telnet-debuginfo-1:0.17-26.EL3.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-debuginfo@0.17-26.EL3.2?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-1:0.17-31.EL4.2.i386", "product": { "name": "telnet-1:0.17-31.EL4.2.i386", "product_id": "telnet-1:0.17-31.EL4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet@0.17-31.EL4.2?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-server-1:0.17-31.EL4.2.i386", "product": { "name": "telnet-server-1:0.17-31.EL4.2.i386", "product_id": "telnet-server-1:0.17-31.EL4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-server@0.17-31.EL4.2?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-debuginfo-1:0.17-31.EL4.2.i386", "product": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.i386", "product_id": "telnet-debuginfo-1:0.17-31.EL4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-debuginfo@0.17-31.EL4.2?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "telnet-1:0.17-26.EL3.2.ppc", "product": { "name": "telnet-1:0.17-26.EL3.2.ppc", "product_id": "telnet-1:0.17-26.EL3.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet@0.17-26.EL3.2?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-server-1:0.17-26.EL3.2.ppc", "product": { "name": "telnet-server-1:0.17-26.EL3.2.ppc", "product_id": "telnet-server-1:0.17-26.EL3.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-server@0.17-26.EL3.2?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-debuginfo-1:0.17-26.EL3.2.ppc", "product": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.ppc", "product_id": "telnet-debuginfo-1:0.17-26.EL3.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-debuginfo@0.17-26.EL3.2?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-1:0.17-31.EL4.2.ppc", "product": { "name": "telnet-1:0.17-31.EL4.2.ppc", "product_id": "telnet-1:0.17-31.EL4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet@0.17-31.EL4.2?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-server-1:0.17-31.EL4.2.ppc", "product": { "name": "telnet-server-1:0.17-31.EL4.2.ppc", "product_id": "telnet-server-1:0.17-31.EL4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-server@0.17-31.EL4.2?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-debuginfo-1:0.17-31.EL4.2.ppc", "product": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.ppc", "product_id": "telnet-debuginfo-1:0.17-31.EL4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-debuginfo@0.17-31.EL4.2?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "telnet-1:0.17-26.EL3.2.s390", "product": { "name": "telnet-1:0.17-26.EL3.2.s390", "product_id": "telnet-1:0.17-26.EL3.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet@0.17-26.EL3.2?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-server-1:0.17-26.EL3.2.s390", "product": { "name": "telnet-server-1:0.17-26.EL3.2.s390", "product_id": "telnet-server-1:0.17-26.EL3.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-server@0.17-26.EL3.2?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-debuginfo-1:0.17-26.EL3.2.s390", "product": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.s390", "product_id": "telnet-debuginfo-1:0.17-26.EL3.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-debuginfo@0.17-26.EL3.2?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-1:0.17-31.EL4.2.s390", "product": { "name": "telnet-1:0.17-31.EL4.2.s390", "product_id": "telnet-1:0.17-31.EL4.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet@0.17-31.EL4.2?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-server-1:0.17-31.EL4.2.s390", "product": { "name": "telnet-server-1:0.17-31.EL4.2.s390", "product_id": "telnet-server-1:0.17-31.EL4.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-server@0.17-31.EL4.2?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-debuginfo-1:0.17-31.EL4.2.s390", "product": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.s390", "product_id": "telnet-debuginfo-1:0.17-31.EL4.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-debuginfo@0.17-31.EL4.2?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "telnet-1:0.17-26.EL3.2.s390x", "product": { "name": "telnet-1:0.17-26.EL3.2.s390x", "product_id": "telnet-1:0.17-26.EL3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet@0.17-26.EL3.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-server-1:0.17-26.EL3.2.s390x", "product": { "name": "telnet-server-1:0.17-26.EL3.2.s390x", "product_id": "telnet-server-1:0.17-26.EL3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-server@0.17-26.EL3.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-debuginfo-1:0.17-26.EL3.2.s390x", "product": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.s390x", "product_id": "telnet-debuginfo-1:0.17-26.EL3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-debuginfo@0.17-26.EL3.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-1:0.17-31.EL4.2.s390x", "product": { "name": "telnet-1:0.17-31.EL4.2.s390x", "product_id": "telnet-1:0.17-31.EL4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet@0.17-31.EL4.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-server-1:0.17-31.EL4.2.s390x", "product": { "name": "telnet-server-1:0.17-31.EL4.2.s390x", "product_id": "telnet-server-1:0.17-31.EL4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-server@0.17-31.EL4.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "telnet-debuginfo-1:0.17-31.EL4.2.s390x", "product": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.s390x", "product_id": "telnet-debuginfo-1:0.17-31.EL4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/telnet-debuginfo@0.17-31.EL4.2?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-1:0.17-26.EL3.2.i386" }, "product_reference": "telnet-1:0.17-26.EL3.2.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-1:0.17-26.EL3.2.ia64" }, "product_reference": "telnet-1:0.17-26.EL3.2.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-1:0.17-26.EL3.2.ppc" }, "product_reference": "telnet-1:0.17-26.EL3.2.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-1:0.17-26.EL3.2.s390" }, "product_reference": "telnet-1:0.17-26.EL3.2.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-1:0.17-26.EL3.2.s390x" }, "product_reference": "telnet-1:0.17-26.EL3.2.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-1:0.17-26.EL3.2.src" }, "product_reference": "telnet-1:0.17-26.EL3.2.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-1:0.17-26.EL3.2.x86_64" }, "product_reference": "telnet-1:0.17-26.EL3.2.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-debuginfo-1:0.17-26.EL3.2.i386" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-debuginfo-1:0.17-26.EL3.2.ia64" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-debuginfo-1:0.17-26.EL3.2.ppc" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-debuginfo-1:0.17-26.EL3.2.s390" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-debuginfo-1:0.17-26.EL3.2.s390x" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-debuginfo-1:0.17-26.EL3.2.x86_64" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-server-1:0.17-26.EL3.2.i386" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-server-1:0.17-26.EL3.2.ia64" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-server-1:0.17-26.EL3.2.ppc" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-server-1:0.17-26.EL3.2.s390" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-server-1:0.17-26.EL3.2.s390x" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:telnet-server-1:0.17-26.EL3.2.x86_64" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-1:0.17-26.EL3.2.i386" }, "product_reference": "telnet-1:0.17-26.EL3.2.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-1:0.17-26.EL3.2.ia64" }, "product_reference": "telnet-1:0.17-26.EL3.2.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-1:0.17-26.EL3.2.ppc" }, "product_reference": "telnet-1:0.17-26.EL3.2.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-1:0.17-26.EL3.2.s390" }, "product_reference": "telnet-1:0.17-26.EL3.2.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-1:0.17-26.EL3.2.s390x" }, "product_reference": "telnet-1:0.17-26.EL3.2.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-1:0.17-26.EL3.2.src" }, "product_reference": "telnet-1:0.17-26.EL3.2.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-1:0.17-26.EL3.2.x86_64" }, "product_reference": "telnet-1:0.17-26.EL3.2.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.i386" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.ia64" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.ppc" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.s390" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.s390x" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.x86_64" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-server-1:0.17-26.EL3.2.i386" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-server-1:0.17-26.EL3.2.ia64" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-server-1:0.17-26.EL3.2.ppc" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-server-1:0.17-26.EL3.2.s390" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-server-1:0.17-26.EL3.2.s390x" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:telnet-server-1:0.17-26.EL3.2.x86_64" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-1:0.17-26.EL3.2.i386" }, "product_reference": "telnet-1:0.17-26.EL3.2.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-1:0.17-26.EL3.2.ia64" }, "product_reference": "telnet-1:0.17-26.EL3.2.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-1:0.17-26.EL3.2.ppc" }, "product_reference": "telnet-1:0.17-26.EL3.2.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-1:0.17-26.EL3.2.s390" }, "product_reference": "telnet-1:0.17-26.EL3.2.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-1:0.17-26.EL3.2.s390x" }, "product_reference": "telnet-1:0.17-26.EL3.2.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-1:0.17-26.EL3.2.src" }, "product_reference": "telnet-1:0.17-26.EL3.2.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-1:0.17-26.EL3.2.x86_64" }, "product_reference": "telnet-1:0.17-26.EL3.2.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-debuginfo-1:0.17-26.EL3.2.i386" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-debuginfo-1:0.17-26.EL3.2.ia64" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-debuginfo-1:0.17-26.EL3.2.ppc" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-debuginfo-1:0.17-26.EL3.2.s390" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-debuginfo-1:0.17-26.EL3.2.s390x" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-debuginfo-1:0.17-26.EL3.2.x86_64" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-server-1:0.17-26.EL3.2.i386" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-server-1:0.17-26.EL3.2.ia64" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-server-1:0.17-26.EL3.2.ppc" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-server-1:0.17-26.EL3.2.s390" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-server-1:0.17-26.EL3.2.s390x" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:telnet-server-1:0.17-26.EL3.2.x86_64" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-1:0.17-26.EL3.2.i386" }, "product_reference": "telnet-1:0.17-26.EL3.2.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-1:0.17-26.EL3.2.ia64" }, "product_reference": "telnet-1:0.17-26.EL3.2.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-1:0.17-26.EL3.2.ppc" }, "product_reference": "telnet-1:0.17-26.EL3.2.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-1:0.17-26.EL3.2.s390" }, "product_reference": "telnet-1:0.17-26.EL3.2.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-1:0.17-26.EL3.2.s390x" }, "product_reference": "telnet-1:0.17-26.EL3.2.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-1:0.17-26.EL3.2.src" }, "product_reference": "telnet-1:0.17-26.EL3.2.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-26.EL3.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-1:0.17-26.EL3.2.x86_64" }, "product_reference": "telnet-1:0.17-26.EL3.2.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-debuginfo-1:0.17-26.EL3.2.i386" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-debuginfo-1:0.17-26.EL3.2.ia64" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-debuginfo-1:0.17-26.EL3.2.ppc" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-debuginfo-1:0.17-26.EL3.2.s390" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-debuginfo-1:0.17-26.EL3.2.s390x" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-26.EL3.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-debuginfo-1:0.17-26.EL3.2.x86_64" }, "product_reference": "telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-server-1:0.17-26.EL3.2.i386" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-server-1:0.17-26.EL3.2.ia64" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-server-1:0.17-26.EL3.2.ppc" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-server-1:0.17-26.EL3.2.s390" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-server-1:0.17-26.EL3.2.s390x" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-26.EL3.2.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:telnet-server-1:0.17-26.EL3.2.x86_64" }, "product_reference": "telnet-server-1:0.17-26.EL3.2.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-1:0.17-31.EL4.2.i386" }, "product_reference": "telnet-1:0.17-31.EL4.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-1:0.17-31.EL4.2.ia64" }, "product_reference": "telnet-1:0.17-31.EL4.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-1:0.17-31.EL4.2.ppc" }, "product_reference": "telnet-1:0.17-31.EL4.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-1:0.17-31.EL4.2.s390" }, "product_reference": "telnet-1:0.17-31.EL4.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-1:0.17-31.EL4.2.s390x" }, "product_reference": "telnet-1:0.17-31.EL4.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-1:0.17-31.EL4.2.src" }, "product_reference": "telnet-1:0.17-31.EL4.2.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-1:0.17-31.EL4.2.x86_64" }, "product_reference": "telnet-1:0.17-31.EL4.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-debuginfo-1:0.17-31.EL4.2.i386" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-debuginfo-1:0.17-31.EL4.2.ia64" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-debuginfo-1:0.17-31.EL4.2.ppc" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-debuginfo-1:0.17-31.EL4.2.s390" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-debuginfo-1:0.17-31.EL4.2.s390x" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-debuginfo-1:0.17-31.EL4.2.x86_64" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-server-1:0.17-31.EL4.2.i386" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-server-1:0.17-31.EL4.2.ia64" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-server-1:0.17-31.EL4.2.ppc" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-server-1:0.17-31.EL4.2.s390" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-server-1:0.17-31.EL4.2.s390x" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:telnet-server-1:0.17-31.EL4.2.x86_64" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-1:0.17-31.EL4.2.i386" }, "product_reference": "telnet-1:0.17-31.EL4.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-1:0.17-31.EL4.2.ia64" }, "product_reference": "telnet-1:0.17-31.EL4.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-1:0.17-31.EL4.2.ppc" }, "product_reference": "telnet-1:0.17-31.EL4.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-1:0.17-31.EL4.2.s390" }, "product_reference": "telnet-1:0.17-31.EL4.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-1:0.17-31.EL4.2.s390x" }, "product_reference": "telnet-1:0.17-31.EL4.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-1:0.17-31.EL4.2.src" }, "product_reference": "telnet-1:0.17-31.EL4.2.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-1:0.17-31.EL4.2.x86_64" }, "product_reference": "telnet-1:0.17-31.EL4.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.i386" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.ia64" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.ppc" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.s390" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.s390x" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.x86_64" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-server-1:0.17-31.EL4.2.i386" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-server-1:0.17-31.EL4.2.ia64" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-server-1:0.17-31.EL4.2.ppc" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-server-1:0.17-31.EL4.2.s390" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-server-1:0.17-31.EL4.2.s390x" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:telnet-server-1:0.17-31.EL4.2.x86_64" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-1:0.17-31.EL4.2.i386" }, "product_reference": "telnet-1:0.17-31.EL4.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-1:0.17-31.EL4.2.ia64" }, "product_reference": "telnet-1:0.17-31.EL4.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-1:0.17-31.EL4.2.ppc" }, "product_reference": "telnet-1:0.17-31.EL4.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-1:0.17-31.EL4.2.s390" }, "product_reference": "telnet-1:0.17-31.EL4.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-1:0.17-31.EL4.2.s390x" }, "product_reference": "telnet-1:0.17-31.EL4.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-1:0.17-31.EL4.2.src" }, "product_reference": "telnet-1:0.17-31.EL4.2.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-1:0.17-31.EL4.2.x86_64" }, "product_reference": "telnet-1:0.17-31.EL4.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-debuginfo-1:0.17-31.EL4.2.i386" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-debuginfo-1:0.17-31.EL4.2.ia64" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-debuginfo-1:0.17-31.EL4.2.ppc" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-debuginfo-1:0.17-31.EL4.2.s390" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-debuginfo-1:0.17-31.EL4.2.s390x" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-debuginfo-1:0.17-31.EL4.2.x86_64" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-server-1:0.17-31.EL4.2.i386" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-server-1:0.17-31.EL4.2.ia64" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-server-1:0.17-31.EL4.2.ppc" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-server-1:0.17-31.EL4.2.s390" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-server-1:0.17-31.EL4.2.s390x" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:telnet-server-1:0.17-31.EL4.2.x86_64" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-1:0.17-31.EL4.2.i386" }, "product_reference": "telnet-1:0.17-31.EL4.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-1:0.17-31.EL4.2.ia64" }, "product_reference": "telnet-1:0.17-31.EL4.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-1:0.17-31.EL4.2.ppc" }, "product_reference": "telnet-1:0.17-31.EL4.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-1:0.17-31.EL4.2.s390" }, "product_reference": "telnet-1:0.17-31.EL4.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-1:0.17-31.EL4.2.s390x" }, "product_reference": "telnet-1:0.17-31.EL4.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-1:0.17-31.EL4.2.src" }, "product_reference": "telnet-1:0.17-31.EL4.2.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-1:0.17-31.EL4.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-1:0.17-31.EL4.2.x86_64" }, "product_reference": "telnet-1:0.17-31.EL4.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-debuginfo-1:0.17-31.EL4.2.i386" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-debuginfo-1:0.17-31.EL4.2.ia64" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-debuginfo-1:0.17-31.EL4.2.ppc" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-debuginfo-1:0.17-31.EL4.2.s390" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-debuginfo-1:0.17-31.EL4.2.s390x" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-debuginfo-1:0.17-31.EL4.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-debuginfo-1:0.17-31.EL4.2.x86_64" }, "product_reference": "telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-server-1:0.17-31.EL4.2.i386" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-server-1:0.17-31.EL4.2.ia64" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-server-1:0.17-31.EL4.2.ppc" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-server-1:0.17-31.EL4.2.s390" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-server-1:0.17-31.EL4.2.s390x" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "telnet-server-1:0.17-31.EL4.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:telnet-server-1:0.17-31.EL4.2.x86_64" }, "product_reference": "telnet-server-1:0.17-31.EL4.2.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "iDefense" ] } ], "cve": "CVE-2005-0468", "discovery_date": "2005-02-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617527" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:telnet-1:0.17-26.EL3.2.i386", "3AS:telnet-1:0.17-26.EL3.2.ia64", "3AS:telnet-1:0.17-26.EL3.2.ppc", "3AS:telnet-1:0.17-26.EL3.2.s390", "3AS:telnet-1:0.17-26.EL3.2.s390x", "3AS:telnet-1:0.17-26.EL3.2.src", "3AS:telnet-1:0.17-26.EL3.2.x86_64", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.i386", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.ia64", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.ppc", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.s390", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.s390x", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "3AS:telnet-server-1:0.17-26.EL3.2.i386", "3AS:telnet-server-1:0.17-26.EL3.2.ia64", "3AS:telnet-server-1:0.17-26.EL3.2.ppc", "3AS:telnet-server-1:0.17-26.EL3.2.s390", "3AS:telnet-server-1:0.17-26.EL3.2.s390x", "3AS:telnet-server-1:0.17-26.EL3.2.x86_64", "3Desktop:telnet-1:0.17-26.EL3.2.i386", "3Desktop:telnet-1:0.17-26.EL3.2.ia64", "3Desktop:telnet-1:0.17-26.EL3.2.ppc", "3Desktop:telnet-1:0.17-26.EL3.2.s390", "3Desktop:telnet-1:0.17-26.EL3.2.s390x", "3Desktop:telnet-1:0.17-26.EL3.2.src", "3Desktop:telnet-1:0.17-26.EL3.2.x86_64", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.i386", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.ia64", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.ppc", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.s390", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.s390x", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "3Desktop:telnet-server-1:0.17-26.EL3.2.i386", "3Desktop:telnet-server-1:0.17-26.EL3.2.ia64", "3Desktop:telnet-server-1:0.17-26.EL3.2.ppc", "3Desktop:telnet-server-1:0.17-26.EL3.2.s390", "3Desktop:telnet-server-1:0.17-26.EL3.2.s390x", "3Desktop:telnet-server-1:0.17-26.EL3.2.x86_64", "3ES:telnet-1:0.17-26.EL3.2.i386", "3ES:telnet-1:0.17-26.EL3.2.ia64", "3ES:telnet-1:0.17-26.EL3.2.ppc", "3ES:telnet-1:0.17-26.EL3.2.s390", "3ES:telnet-1:0.17-26.EL3.2.s390x", "3ES:telnet-1:0.17-26.EL3.2.src", "3ES:telnet-1:0.17-26.EL3.2.x86_64", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.i386", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.ia64", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.ppc", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.s390", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.s390x", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "3ES:telnet-server-1:0.17-26.EL3.2.i386", "3ES:telnet-server-1:0.17-26.EL3.2.ia64", "3ES:telnet-server-1:0.17-26.EL3.2.ppc", "3ES:telnet-server-1:0.17-26.EL3.2.s390", "3ES:telnet-server-1:0.17-26.EL3.2.s390x", "3ES:telnet-server-1:0.17-26.EL3.2.x86_64", "3WS:telnet-1:0.17-26.EL3.2.i386", "3WS:telnet-1:0.17-26.EL3.2.ia64", "3WS:telnet-1:0.17-26.EL3.2.ppc", "3WS:telnet-1:0.17-26.EL3.2.s390", "3WS:telnet-1:0.17-26.EL3.2.s390x", "3WS:telnet-1:0.17-26.EL3.2.src", "3WS:telnet-1:0.17-26.EL3.2.x86_64", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.i386", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.ia64", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.ppc", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.s390", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.s390x", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "3WS:telnet-server-1:0.17-26.EL3.2.i386", "3WS:telnet-server-1:0.17-26.EL3.2.ia64", "3WS:telnet-server-1:0.17-26.EL3.2.ppc", "3WS:telnet-server-1:0.17-26.EL3.2.s390", "3WS:telnet-server-1:0.17-26.EL3.2.s390x", "3WS:telnet-server-1:0.17-26.EL3.2.x86_64", "4AS:telnet-1:0.17-31.EL4.2.i386", "4AS:telnet-1:0.17-31.EL4.2.ia64", "4AS:telnet-1:0.17-31.EL4.2.ppc", "4AS:telnet-1:0.17-31.EL4.2.s390", "4AS:telnet-1:0.17-31.EL4.2.s390x", "4AS:telnet-1:0.17-31.EL4.2.src", "4AS:telnet-1:0.17-31.EL4.2.x86_64", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.i386", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.ia64", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.ppc", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.s390", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.s390x", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "4AS:telnet-server-1:0.17-31.EL4.2.i386", "4AS:telnet-server-1:0.17-31.EL4.2.ia64", "4AS:telnet-server-1:0.17-31.EL4.2.ppc", "4AS:telnet-server-1:0.17-31.EL4.2.s390", "4AS:telnet-server-1:0.17-31.EL4.2.s390x", "4AS:telnet-server-1:0.17-31.EL4.2.x86_64", "4Desktop:telnet-1:0.17-31.EL4.2.i386", "4Desktop:telnet-1:0.17-31.EL4.2.ia64", "4Desktop:telnet-1:0.17-31.EL4.2.ppc", "4Desktop:telnet-1:0.17-31.EL4.2.s390", "4Desktop:telnet-1:0.17-31.EL4.2.s390x", "4Desktop:telnet-1:0.17-31.EL4.2.src", "4Desktop:telnet-1:0.17-31.EL4.2.x86_64", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.i386", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.ia64", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.ppc", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.s390", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.s390x", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "4Desktop:telnet-server-1:0.17-31.EL4.2.i386", "4Desktop:telnet-server-1:0.17-31.EL4.2.ia64", "4Desktop:telnet-server-1:0.17-31.EL4.2.ppc", "4Desktop:telnet-server-1:0.17-31.EL4.2.s390", "4Desktop:telnet-server-1:0.17-31.EL4.2.s390x", "4Desktop:telnet-server-1:0.17-31.EL4.2.x86_64", "4ES:telnet-1:0.17-31.EL4.2.i386", "4ES:telnet-1:0.17-31.EL4.2.ia64", "4ES:telnet-1:0.17-31.EL4.2.ppc", "4ES:telnet-1:0.17-31.EL4.2.s390", "4ES:telnet-1:0.17-31.EL4.2.s390x", "4ES:telnet-1:0.17-31.EL4.2.src", "4ES:telnet-1:0.17-31.EL4.2.x86_64", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.i386", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.ia64", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.ppc", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.s390", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.s390x", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "4ES:telnet-server-1:0.17-31.EL4.2.i386", "4ES:telnet-server-1:0.17-31.EL4.2.ia64", "4ES:telnet-server-1:0.17-31.EL4.2.ppc", "4ES:telnet-server-1:0.17-31.EL4.2.s390", "4ES:telnet-server-1:0.17-31.EL4.2.s390x", "4ES:telnet-server-1:0.17-31.EL4.2.x86_64", "4WS:telnet-1:0.17-31.EL4.2.i386", "4WS:telnet-1:0.17-31.EL4.2.ia64", "4WS:telnet-1:0.17-31.EL4.2.ppc", "4WS:telnet-1:0.17-31.EL4.2.s390", "4WS:telnet-1:0.17-31.EL4.2.s390x", "4WS:telnet-1:0.17-31.EL4.2.src", "4WS:telnet-1:0.17-31.EL4.2.x86_64", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.i386", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.ia64", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.ppc", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.s390", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.s390x", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "4WS:telnet-server-1:0.17-31.EL4.2.i386", "4WS:telnet-server-1:0.17-31.EL4.2.ia64", "4WS:telnet-server-1:0.17-31.EL4.2.ppc", "4WS:telnet-server-1:0.17-31.EL4.2.s390", "4WS:telnet-server-1:0.17-31.EL4.2.s390x", "4WS:telnet-server-1:0.17-31.EL4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0468" }, { "category": "external", "summary": "RHBZ#1617527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617527" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0468", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0468" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0468", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0468" } ], "release_date": "2005-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-03-28T19:49:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:telnet-1:0.17-26.EL3.2.i386", "3AS:telnet-1:0.17-26.EL3.2.ia64", "3AS:telnet-1:0.17-26.EL3.2.ppc", "3AS:telnet-1:0.17-26.EL3.2.s390", "3AS:telnet-1:0.17-26.EL3.2.s390x", "3AS:telnet-1:0.17-26.EL3.2.src", "3AS:telnet-1:0.17-26.EL3.2.x86_64", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.i386", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.ia64", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.ppc", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.s390", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.s390x", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "3AS:telnet-server-1:0.17-26.EL3.2.i386", "3AS:telnet-server-1:0.17-26.EL3.2.ia64", "3AS:telnet-server-1:0.17-26.EL3.2.ppc", "3AS:telnet-server-1:0.17-26.EL3.2.s390", "3AS:telnet-server-1:0.17-26.EL3.2.s390x", "3AS:telnet-server-1:0.17-26.EL3.2.x86_64", "3Desktop:telnet-1:0.17-26.EL3.2.i386", "3Desktop:telnet-1:0.17-26.EL3.2.ia64", "3Desktop:telnet-1:0.17-26.EL3.2.ppc", "3Desktop:telnet-1:0.17-26.EL3.2.s390", "3Desktop:telnet-1:0.17-26.EL3.2.s390x", "3Desktop:telnet-1:0.17-26.EL3.2.src", "3Desktop:telnet-1:0.17-26.EL3.2.x86_64", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.i386", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.ia64", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.ppc", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.s390", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.s390x", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "3Desktop:telnet-server-1:0.17-26.EL3.2.i386", "3Desktop:telnet-server-1:0.17-26.EL3.2.ia64", "3Desktop:telnet-server-1:0.17-26.EL3.2.ppc", "3Desktop:telnet-server-1:0.17-26.EL3.2.s390", "3Desktop:telnet-server-1:0.17-26.EL3.2.s390x", "3Desktop:telnet-server-1:0.17-26.EL3.2.x86_64", "3ES:telnet-1:0.17-26.EL3.2.i386", "3ES:telnet-1:0.17-26.EL3.2.ia64", "3ES:telnet-1:0.17-26.EL3.2.ppc", "3ES:telnet-1:0.17-26.EL3.2.s390", "3ES:telnet-1:0.17-26.EL3.2.s390x", "3ES:telnet-1:0.17-26.EL3.2.src", "3ES:telnet-1:0.17-26.EL3.2.x86_64", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.i386", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.ia64", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.ppc", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.s390", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.s390x", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "3ES:telnet-server-1:0.17-26.EL3.2.i386", "3ES:telnet-server-1:0.17-26.EL3.2.ia64", "3ES:telnet-server-1:0.17-26.EL3.2.ppc", "3ES:telnet-server-1:0.17-26.EL3.2.s390", "3ES:telnet-server-1:0.17-26.EL3.2.s390x", "3ES:telnet-server-1:0.17-26.EL3.2.x86_64", "3WS:telnet-1:0.17-26.EL3.2.i386", "3WS:telnet-1:0.17-26.EL3.2.ia64", "3WS:telnet-1:0.17-26.EL3.2.ppc", "3WS:telnet-1:0.17-26.EL3.2.s390", "3WS:telnet-1:0.17-26.EL3.2.s390x", "3WS:telnet-1:0.17-26.EL3.2.src", "3WS:telnet-1:0.17-26.EL3.2.x86_64", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.i386", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.ia64", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.ppc", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.s390", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.s390x", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "3WS:telnet-server-1:0.17-26.EL3.2.i386", "3WS:telnet-server-1:0.17-26.EL3.2.ia64", "3WS:telnet-server-1:0.17-26.EL3.2.ppc", "3WS:telnet-server-1:0.17-26.EL3.2.s390", "3WS:telnet-server-1:0.17-26.EL3.2.s390x", "3WS:telnet-server-1:0.17-26.EL3.2.x86_64", "4AS:telnet-1:0.17-31.EL4.2.i386", "4AS:telnet-1:0.17-31.EL4.2.ia64", "4AS:telnet-1:0.17-31.EL4.2.ppc", "4AS:telnet-1:0.17-31.EL4.2.s390", "4AS:telnet-1:0.17-31.EL4.2.s390x", "4AS:telnet-1:0.17-31.EL4.2.src", "4AS:telnet-1:0.17-31.EL4.2.x86_64", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.i386", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.ia64", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.ppc", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.s390", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.s390x", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "4AS:telnet-server-1:0.17-31.EL4.2.i386", "4AS:telnet-server-1:0.17-31.EL4.2.ia64", "4AS:telnet-server-1:0.17-31.EL4.2.ppc", "4AS:telnet-server-1:0.17-31.EL4.2.s390", "4AS:telnet-server-1:0.17-31.EL4.2.s390x", "4AS:telnet-server-1:0.17-31.EL4.2.x86_64", "4Desktop:telnet-1:0.17-31.EL4.2.i386", "4Desktop:telnet-1:0.17-31.EL4.2.ia64", "4Desktop:telnet-1:0.17-31.EL4.2.ppc", "4Desktop:telnet-1:0.17-31.EL4.2.s390", "4Desktop:telnet-1:0.17-31.EL4.2.s390x", "4Desktop:telnet-1:0.17-31.EL4.2.src", "4Desktop:telnet-1:0.17-31.EL4.2.x86_64", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.i386", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.ia64", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.ppc", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.s390", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.s390x", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "4Desktop:telnet-server-1:0.17-31.EL4.2.i386", "4Desktop:telnet-server-1:0.17-31.EL4.2.ia64", "4Desktop:telnet-server-1:0.17-31.EL4.2.ppc", "4Desktop:telnet-server-1:0.17-31.EL4.2.s390", "4Desktop:telnet-server-1:0.17-31.EL4.2.s390x", "4Desktop:telnet-server-1:0.17-31.EL4.2.x86_64", "4ES:telnet-1:0.17-31.EL4.2.i386", "4ES:telnet-1:0.17-31.EL4.2.ia64", "4ES:telnet-1:0.17-31.EL4.2.ppc", "4ES:telnet-1:0.17-31.EL4.2.s390", "4ES:telnet-1:0.17-31.EL4.2.s390x", "4ES:telnet-1:0.17-31.EL4.2.src", "4ES:telnet-1:0.17-31.EL4.2.x86_64", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.i386", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.ia64", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.ppc", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.s390", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.s390x", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "4ES:telnet-server-1:0.17-31.EL4.2.i386", "4ES:telnet-server-1:0.17-31.EL4.2.ia64", "4ES:telnet-server-1:0.17-31.EL4.2.ppc", "4ES:telnet-server-1:0.17-31.EL4.2.s390", "4ES:telnet-server-1:0.17-31.EL4.2.s390x", "4ES:telnet-server-1:0.17-31.EL4.2.x86_64", "4WS:telnet-1:0.17-31.EL4.2.i386", "4WS:telnet-1:0.17-31.EL4.2.ia64", "4WS:telnet-1:0.17-31.EL4.2.ppc", "4WS:telnet-1:0.17-31.EL4.2.s390", "4WS:telnet-1:0.17-31.EL4.2.s390x", "4WS:telnet-1:0.17-31.EL4.2.src", "4WS:telnet-1:0.17-31.EL4.2.x86_64", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.i386", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.ia64", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.ppc", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.s390", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.s390x", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "4WS:telnet-server-1:0.17-31.EL4.2.i386", "4WS:telnet-server-1:0.17-31.EL4.2.ia64", "4WS:telnet-server-1:0.17-31.EL4.2.ppc", "4WS:telnet-server-1:0.17-31.EL4.2.s390", "4WS:telnet-server-1:0.17-31.EL4.2.s390x", "4WS:telnet-server-1:0.17-31.EL4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:327" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "acknowledgments": [ { "names": [ "iDefense" ] } ], "cve": "CVE-2005-0469", "discovery_date": "2005-02-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617528" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:telnet-1:0.17-26.EL3.2.i386", "3AS:telnet-1:0.17-26.EL3.2.ia64", "3AS:telnet-1:0.17-26.EL3.2.ppc", "3AS:telnet-1:0.17-26.EL3.2.s390", "3AS:telnet-1:0.17-26.EL3.2.s390x", "3AS:telnet-1:0.17-26.EL3.2.src", "3AS:telnet-1:0.17-26.EL3.2.x86_64", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.i386", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.ia64", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.ppc", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.s390", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.s390x", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "3AS:telnet-server-1:0.17-26.EL3.2.i386", "3AS:telnet-server-1:0.17-26.EL3.2.ia64", "3AS:telnet-server-1:0.17-26.EL3.2.ppc", "3AS:telnet-server-1:0.17-26.EL3.2.s390", "3AS:telnet-server-1:0.17-26.EL3.2.s390x", "3AS:telnet-server-1:0.17-26.EL3.2.x86_64", "3Desktop:telnet-1:0.17-26.EL3.2.i386", "3Desktop:telnet-1:0.17-26.EL3.2.ia64", "3Desktop:telnet-1:0.17-26.EL3.2.ppc", "3Desktop:telnet-1:0.17-26.EL3.2.s390", "3Desktop:telnet-1:0.17-26.EL3.2.s390x", "3Desktop:telnet-1:0.17-26.EL3.2.src", "3Desktop:telnet-1:0.17-26.EL3.2.x86_64", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.i386", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.ia64", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.ppc", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.s390", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.s390x", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "3Desktop:telnet-server-1:0.17-26.EL3.2.i386", "3Desktop:telnet-server-1:0.17-26.EL3.2.ia64", "3Desktop:telnet-server-1:0.17-26.EL3.2.ppc", "3Desktop:telnet-server-1:0.17-26.EL3.2.s390", "3Desktop:telnet-server-1:0.17-26.EL3.2.s390x", "3Desktop:telnet-server-1:0.17-26.EL3.2.x86_64", "3ES:telnet-1:0.17-26.EL3.2.i386", "3ES:telnet-1:0.17-26.EL3.2.ia64", "3ES:telnet-1:0.17-26.EL3.2.ppc", "3ES:telnet-1:0.17-26.EL3.2.s390", "3ES:telnet-1:0.17-26.EL3.2.s390x", "3ES:telnet-1:0.17-26.EL3.2.src", "3ES:telnet-1:0.17-26.EL3.2.x86_64", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.i386", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.ia64", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.ppc", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.s390", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.s390x", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "3ES:telnet-server-1:0.17-26.EL3.2.i386", "3ES:telnet-server-1:0.17-26.EL3.2.ia64", "3ES:telnet-server-1:0.17-26.EL3.2.ppc", "3ES:telnet-server-1:0.17-26.EL3.2.s390", "3ES:telnet-server-1:0.17-26.EL3.2.s390x", "3ES:telnet-server-1:0.17-26.EL3.2.x86_64", "3WS:telnet-1:0.17-26.EL3.2.i386", "3WS:telnet-1:0.17-26.EL3.2.ia64", "3WS:telnet-1:0.17-26.EL3.2.ppc", "3WS:telnet-1:0.17-26.EL3.2.s390", "3WS:telnet-1:0.17-26.EL3.2.s390x", "3WS:telnet-1:0.17-26.EL3.2.src", "3WS:telnet-1:0.17-26.EL3.2.x86_64", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.i386", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.ia64", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.ppc", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.s390", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.s390x", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "3WS:telnet-server-1:0.17-26.EL3.2.i386", "3WS:telnet-server-1:0.17-26.EL3.2.ia64", "3WS:telnet-server-1:0.17-26.EL3.2.ppc", "3WS:telnet-server-1:0.17-26.EL3.2.s390", "3WS:telnet-server-1:0.17-26.EL3.2.s390x", "3WS:telnet-server-1:0.17-26.EL3.2.x86_64", "4AS:telnet-1:0.17-31.EL4.2.i386", "4AS:telnet-1:0.17-31.EL4.2.ia64", "4AS:telnet-1:0.17-31.EL4.2.ppc", "4AS:telnet-1:0.17-31.EL4.2.s390", "4AS:telnet-1:0.17-31.EL4.2.s390x", "4AS:telnet-1:0.17-31.EL4.2.src", "4AS:telnet-1:0.17-31.EL4.2.x86_64", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.i386", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.ia64", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.ppc", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.s390", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.s390x", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "4AS:telnet-server-1:0.17-31.EL4.2.i386", "4AS:telnet-server-1:0.17-31.EL4.2.ia64", "4AS:telnet-server-1:0.17-31.EL4.2.ppc", "4AS:telnet-server-1:0.17-31.EL4.2.s390", "4AS:telnet-server-1:0.17-31.EL4.2.s390x", "4AS:telnet-server-1:0.17-31.EL4.2.x86_64", "4Desktop:telnet-1:0.17-31.EL4.2.i386", "4Desktop:telnet-1:0.17-31.EL4.2.ia64", "4Desktop:telnet-1:0.17-31.EL4.2.ppc", "4Desktop:telnet-1:0.17-31.EL4.2.s390", "4Desktop:telnet-1:0.17-31.EL4.2.s390x", "4Desktop:telnet-1:0.17-31.EL4.2.src", "4Desktop:telnet-1:0.17-31.EL4.2.x86_64", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.i386", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.ia64", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.ppc", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.s390", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.s390x", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "4Desktop:telnet-server-1:0.17-31.EL4.2.i386", "4Desktop:telnet-server-1:0.17-31.EL4.2.ia64", "4Desktop:telnet-server-1:0.17-31.EL4.2.ppc", "4Desktop:telnet-server-1:0.17-31.EL4.2.s390", "4Desktop:telnet-server-1:0.17-31.EL4.2.s390x", "4Desktop:telnet-server-1:0.17-31.EL4.2.x86_64", "4ES:telnet-1:0.17-31.EL4.2.i386", "4ES:telnet-1:0.17-31.EL4.2.ia64", "4ES:telnet-1:0.17-31.EL4.2.ppc", "4ES:telnet-1:0.17-31.EL4.2.s390", "4ES:telnet-1:0.17-31.EL4.2.s390x", "4ES:telnet-1:0.17-31.EL4.2.src", "4ES:telnet-1:0.17-31.EL4.2.x86_64", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.i386", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.ia64", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.ppc", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.s390", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.s390x", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "4ES:telnet-server-1:0.17-31.EL4.2.i386", "4ES:telnet-server-1:0.17-31.EL4.2.ia64", "4ES:telnet-server-1:0.17-31.EL4.2.ppc", "4ES:telnet-server-1:0.17-31.EL4.2.s390", "4ES:telnet-server-1:0.17-31.EL4.2.s390x", "4ES:telnet-server-1:0.17-31.EL4.2.x86_64", "4WS:telnet-1:0.17-31.EL4.2.i386", "4WS:telnet-1:0.17-31.EL4.2.ia64", "4WS:telnet-1:0.17-31.EL4.2.ppc", "4WS:telnet-1:0.17-31.EL4.2.s390", "4WS:telnet-1:0.17-31.EL4.2.s390x", "4WS:telnet-1:0.17-31.EL4.2.src", "4WS:telnet-1:0.17-31.EL4.2.x86_64", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.i386", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.ia64", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.ppc", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.s390", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.s390x", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "4WS:telnet-server-1:0.17-31.EL4.2.i386", "4WS:telnet-server-1:0.17-31.EL4.2.ia64", "4WS:telnet-server-1:0.17-31.EL4.2.ppc", "4WS:telnet-server-1:0.17-31.EL4.2.s390", "4WS:telnet-server-1:0.17-31.EL4.2.s390x", "4WS:telnet-server-1:0.17-31.EL4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0469" }, { "category": "external", "summary": "RHBZ#1617528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0469", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0469" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0469", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0469" } ], "release_date": "2005-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-03-28T19:49:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:telnet-1:0.17-26.EL3.2.i386", "3AS:telnet-1:0.17-26.EL3.2.ia64", "3AS:telnet-1:0.17-26.EL3.2.ppc", "3AS:telnet-1:0.17-26.EL3.2.s390", "3AS:telnet-1:0.17-26.EL3.2.s390x", "3AS:telnet-1:0.17-26.EL3.2.src", "3AS:telnet-1:0.17-26.EL3.2.x86_64", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.i386", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.ia64", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.ppc", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.s390", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.s390x", "3AS:telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "3AS:telnet-server-1:0.17-26.EL3.2.i386", "3AS:telnet-server-1:0.17-26.EL3.2.ia64", "3AS:telnet-server-1:0.17-26.EL3.2.ppc", "3AS:telnet-server-1:0.17-26.EL3.2.s390", "3AS:telnet-server-1:0.17-26.EL3.2.s390x", "3AS:telnet-server-1:0.17-26.EL3.2.x86_64", "3Desktop:telnet-1:0.17-26.EL3.2.i386", "3Desktop:telnet-1:0.17-26.EL3.2.ia64", "3Desktop:telnet-1:0.17-26.EL3.2.ppc", "3Desktop:telnet-1:0.17-26.EL3.2.s390", "3Desktop:telnet-1:0.17-26.EL3.2.s390x", "3Desktop:telnet-1:0.17-26.EL3.2.src", "3Desktop:telnet-1:0.17-26.EL3.2.x86_64", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.i386", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.ia64", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.ppc", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.s390", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.s390x", "3Desktop:telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "3Desktop:telnet-server-1:0.17-26.EL3.2.i386", "3Desktop:telnet-server-1:0.17-26.EL3.2.ia64", "3Desktop:telnet-server-1:0.17-26.EL3.2.ppc", "3Desktop:telnet-server-1:0.17-26.EL3.2.s390", "3Desktop:telnet-server-1:0.17-26.EL3.2.s390x", "3Desktop:telnet-server-1:0.17-26.EL3.2.x86_64", "3ES:telnet-1:0.17-26.EL3.2.i386", "3ES:telnet-1:0.17-26.EL3.2.ia64", "3ES:telnet-1:0.17-26.EL3.2.ppc", "3ES:telnet-1:0.17-26.EL3.2.s390", "3ES:telnet-1:0.17-26.EL3.2.s390x", "3ES:telnet-1:0.17-26.EL3.2.src", "3ES:telnet-1:0.17-26.EL3.2.x86_64", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.i386", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.ia64", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.ppc", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.s390", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.s390x", "3ES:telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "3ES:telnet-server-1:0.17-26.EL3.2.i386", "3ES:telnet-server-1:0.17-26.EL3.2.ia64", "3ES:telnet-server-1:0.17-26.EL3.2.ppc", "3ES:telnet-server-1:0.17-26.EL3.2.s390", "3ES:telnet-server-1:0.17-26.EL3.2.s390x", "3ES:telnet-server-1:0.17-26.EL3.2.x86_64", "3WS:telnet-1:0.17-26.EL3.2.i386", "3WS:telnet-1:0.17-26.EL3.2.ia64", "3WS:telnet-1:0.17-26.EL3.2.ppc", "3WS:telnet-1:0.17-26.EL3.2.s390", "3WS:telnet-1:0.17-26.EL3.2.s390x", "3WS:telnet-1:0.17-26.EL3.2.src", "3WS:telnet-1:0.17-26.EL3.2.x86_64", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.i386", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.ia64", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.ppc", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.s390", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.s390x", "3WS:telnet-debuginfo-1:0.17-26.EL3.2.x86_64", "3WS:telnet-server-1:0.17-26.EL3.2.i386", "3WS:telnet-server-1:0.17-26.EL3.2.ia64", "3WS:telnet-server-1:0.17-26.EL3.2.ppc", "3WS:telnet-server-1:0.17-26.EL3.2.s390", "3WS:telnet-server-1:0.17-26.EL3.2.s390x", "3WS:telnet-server-1:0.17-26.EL3.2.x86_64", "4AS:telnet-1:0.17-31.EL4.2.i386", "4AS:telnet-1:0.17-31.EL4.2.ia64", "4AS:telnet-1:0.17-31.EL4.2.ppc", "4AS:telnet-1:0.17-31.EL4.2.s390", "4AS:telnet-1:0.17-31.EL4.2.s390x", "4AS:telnet-1:0.17-31.EL4.2.src", "4AS:telnet-1:0.17-31.EL4.2.x86_64", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.i386", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.ia64", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.ppc", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.s390", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.s390x", "4AS:telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "4AS:telnet-server-1:0.17-31.EL4.2.i386", "4AS:telnet-server-1:0.17-31.EL4.2.ia64", "4AS:telnet-server-1:0.17-31.EL4.2.ppc", "4AS:telnet-server-1:0.17-31.EL4.2.s390", "4AS:telnet-server-1:0.17-31.EL4.2.s390x", "4AS:telnet-server-1:0.17-31.EL4.2.x86_64", "4Desktop:telnet-1:0.17-31.EL4.2.i386", "4Desktop:telnet-1:0.17-31.EL4.2.ia64", "4Desktop:telnet-1:0.17-31.EL4.2.ppc", "4Desktop:telnet-1:0.17-31.EL4.2.s390", "4Desktop:telnet-1:0.17-31.EL4.2.s390x", "4Desktop:telnet-1:0.17-31.EL4.2.src", "4Desktop:telnet-1:0.17-31.EL4.2.x86_64", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.i386", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.ia64", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.ppc", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.s390", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.s390x", "4Desktop:telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "4Desktop:telnet-server-1:0.17-31.EL4.2.i386", "4Desktop:telnet-server-1:0.17-31.EL4.2.ia64", "4Desktop:telnet-server-1:0.17-31.EL4.2.ppc", "4Desktop:telnet-server-1:0.17-31.EL4.2.s390", "4Desktop:telnet-server-1:0.17-31.EL4.2.s390x", "4Desktop:telnet-server-1:0.17-31.EL4.2.x86_64", "4ES:telnet-1:0.17-31.EL4.2.i386", "4ES:telnet-1:0.17-31.EL4.2.ia64", "4ES:telnet-1:0.17-31.EL4.2.ppc", "4ES:telnet-1:0.17-31.EL4.2.s390", "4ES:telnet-1:0.17-31.EL4.2.s390x", "4ES:telnet-1:0.17-31.EL4.2.src", "4ES:telnet-1:0.17-31.EL4.2.x86_64", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.i386", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.ia64", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.ppc", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.s390", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.s390x", "4ES:telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "4ES:telnet-server-1:0.17-31.EL4.2.i386", "4ES:telnet-server-1:0.17-31.EL4.2.ia64", "4ES:telnet-server-1:0.17-31.EL4.2.ppc", "4ES:telnet-server-1:0.17-31.EL4.2.s390", "4ES:telnet-server-1:0.17-31.EL4.2.s390x", "4ES:telnet-server-1:0.17-31.EL4.2.x86_64", "4WS:telnet-1:0.17-31.EL4.2.i386", "4WS:telnet-1:0.17-31.EL4.2.ia64", "4WS:telnet-1:0.17-31.EL4.2.ppc", "4WS:telnet-1:0.17-31.EL4.2.s390", "4WS:telnet-1:0.17-31.EL4.2.s390x", "4WS:telnet-1:0.17-31.EL4.2.src", "4WS:telnet-1:0.17-31.EL4.2.x86_64", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.i386", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.ia64", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.ppc", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.s390", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.s390x", "4WS:telnet-debuginfo-1:0.17-31.EL4.2.x86_64", "4WS:telnet-server-1:0.17-31.EL4.2.i386", "4WS:telnet-server-1:0.17-31.EL4.2.ia64", "4WS:telnet-server-1:0.17-31.EL4.2.ppc", "4WS:telnet-server-1:0.17-31.EL4.2.s390", "4WS:telnet-server-1:0.17-31.EL4.2.s390x", "4WS:telnet-server-1:0.17-31.EL4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:327" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2005_330
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated krb5 packages which fix two buffer overflow vulnerabilities in the\nincluded Kerberos-aware telnet client are now available.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Kerberos is a networked authentication system which uses a trusted third\nparty (a KDC) to authenticate clients and servers to each other.\n\nThe krb5-workstation package includes a Kerberos-aware telnet client. \nTwo buffer overflow flaws were discovered in the way the telnet client\nhandles messages from a server. An attacker may be able to execute\narbitrary code on a victim\u0027s machine if the victim can be tricked into\nconnecting to a malicious telnet server. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the names CAN-2005-0468 and\nCAN-2005-0469 to these issues.\n\nUsers of krb5 should update to these erratum packages which contain a\nbackported patch to correct this issue.\n\nRed Hat would like to thank iDEFENSE for their responsible disclosure of\nthis issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:330", "url": "https://access.redhat.com/errata/RHSA-2005:330" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://www.idefense.com/application/poi/display?id=220\u0026type=vulnerabilities", "url": "http://www.idefense.com/application/poi/display?id=220\u0026type=vulnerabilities" }, { "category": "external", "summary": "http://www.idefense.com/application/poi/display?id=221\u0026type=vulnerabilities", "url": "http://www.idefense.com/application/poi/display?id=221\u0026type=vulnerabilities" }, { "category": "external", "summary": "151267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151267" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_330.json" } ], "title": "Red Hat Security Advisory: krb5 security update", "tracking": { "current_release_date": "2024-11-21T23:36:32+00:00", "generator": { "date": "2024-11-21T23:36:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:330", "initial_release_date": "2005-03-30T07:58:00+00:00", "revision_history": [ { "date": "2005-03-30T07:58:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-03-30T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:36:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "krb5-workstation-0:1.2.7-42.ia64", "product": { "name": "krb5-workstation-0:1.2.7-42.ia64", "product_id": "krb5-workstation-0:1.2.7-42.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-42?arch=ia64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.2.7-42.ia64", "product": { "name": "krb5-libs-0:1.2.7-42.ia64", "product_id": "krb5-libs-0:1.2.7-42.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.2.7-42?arch=ia64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.2.7-42.ia64", "product": { "name": "krb5-debuginfo-0:1.2.7-42.ia64", "product_id": "krb5-debuginfo-0:1.2.7-42.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-42?arch=ia64" } } }, { "category": "product_version", "name": "krb5-devel-0:1.2.7-42.ia64", "product": { "name": "krb5-devel-0:1.2.7-42.ia64", "product_id": "krb5-devel-0:1.2.7-42.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.2.7-42?arch=ia64" } } }, { "category": "product_version", "name": "krb5-server-0:1.2.7-42.ia64", "product": { "name": "krb5-server-0:1.2.7-42.ia64", "product_id": "krb5-server-0:1.2.7-42.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.2.7-42?arch=ia64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.3.4-12.ia64", "product": { "name": "krb5-libs-0:1.3.4-12.ia64", "product_id": "krb5-libs-0:1.3.4-12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.3.4-12?arch=ia64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.3.4-12.ia64", "product": { "name": "krb5-workstation-0:1.3.4-12.ia64", "product_id": "krb5-workstation-0:1.3.4-12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-12?arch=ia64" } } }, { "category": "product_version", "name": "krb5-devel-0:1.3.4-12.ia64", "product": { "name": "krb5-devel-0:1.3.4-12.ia64", "product_id": "krb5-devel-0:1.3.4-12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.3.4-12?arch=ia64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.3.4-12.ia64", "product": { "name": "krb5-debuginfo-0:1.3.4-12.ia64", "product_id": "krb5-debuginfo-0:1.3.4-12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-12?arch=ia64" } } }, { "category": "product_version", "name": "krb5-server-0:1.3.4-12.ia64", "product": { "name": "krb5-server-0:1.3.4-12.ia64", "product_id": "krb5-server-0:1.3.4-12.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.3.4-12?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.2.7-42.i386", "product": { "name": "krb5-libs-0:1.2.7-42.i386", "product_id": "krb5-libs-0:1.2.7-42.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.2.7-42?arch=i386" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.2.7-42.i386", "product": { "name": "krb5-debuginfo-0:1.2.7-42.i386", "product_id": "krb5-debuginfo-0:1.2.7-42.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-42?arch=i386" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.2.7-42.i386", "product": { "name": "krb5-workstation-0:1.2.7-42.i386", "product_id": "krb5-workstation-0:1.2.7-42.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-42?arch=i386" } } }, { "category": "product_version", "name": "krb5-devel-0:1.2.7-42.i386", "product": { "name": "krb5-devel-0:1.2.7-42.i386", "product_id": "krb5-devel-0:1.2.7-42.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.2.7-42?arch=i386" } } }, { "category": "product_version", "name": "krb5-server-0:1.2.7-42.i386", "product": { "name": "krb5-server-0:1.2.7-42.i386", "product_id": "krb5-server-0:1.2.7-42.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.2.7-42?arch=i386" } } }, { "category": "product_version", "name": "krb5-libs-0:1.3.4-12.i386", "product": { "name": "krb5-libs-0:1.3.4-12.i386", "product_id": "krb5-libs-0:1.3.4-12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.3.4-12?arch=i386" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.3.4-12.i386", "product": { "name": "krb5-debuginfo-0:1.3.4-12.i386", "product_id": "krb5-debuginfo-0:1.3.4-12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-12?arch=i386" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.3.4-12.i386", "product": { "name": "krb5-workstation-0:1.3.4-12.i386", "product_id": "krb5-workstation-0:1.3.4-12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-12?arch=i386" } } }, { "category": "product_version", "name": "krb5-devel-0:1.3.4-12.i386", "product": { "name": "krb5-devel-0:1.3.4-12.i386", "product_id": "krb5-devel-0:1.3.4-12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.3.4-12?arch=i386" } } }, { "category": "product_version", "name": "krb5-server-0:1.3.4-12.i386", "product": { "name": "krb5-server-0:1.3.4-12.i386", "product_id": "krb5-server-0:1.3.4-12.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.3.4-12?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "krb5-workstation-0:1.2.7-42.x86_64", "product": { "name": "krb5-workstation-0:1.2.7-42.x86_64", "product_id": "krb5-workstation-0:1.2.7-42.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-42?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.2.7-42.x86_64", "product": { "name": "krb5-libs-0:1.2.7-42.x86_64", "product_id": "krb5-libs-0:1.2.7-42.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.2.7-42?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.2.7-42.x86_64", "product": { "name": "krb5-debuginfo-0:1.2.7-42.x86_64", "product_id": "krb5-debuginfo-0:1.2.7-42.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-42?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-devel-0:1.2.7-42.x86_64", "product": { "name": "krb5-devel-0:1.2.7-42.x86_64", "product_id": "krb5-devel-0:1.2.7-42.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.2.7-42?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-0:1.2.7-42.x86_64", "product": { "name": "krb5-server-0:1.2.7-42.x86_64", "product_id": "krb5-server-0:1.2.7-42.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.2.7-42?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.3.4-12.x86_64", "product": { "name": "krb5-libs-0:1.3.4-12.x86_64", "product_id": "krb5-libs-0:1.3.4-12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.3.4-12?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.3.4-12.x86_64", "product": { "name": "krb5-workstation-0:1.3.4-12.x86_64", "product_id": "krb5-workstation-0:1.3.4-12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-12?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-devel-0:1.3.4-12.x86_64", "product": { "name": "krb5-devel-0:1.3.4-12.x86_64", "product_id": "krb5-devel-0:1.3.4-12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.3.4-12?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.3.4-12.x86_64", "product": { "name": "krb5-debuginfo-0:1.3.4-12.x86_64", "product_id": "krb5-debuginfo-0:1.3.4-12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-12?arch=x86_64" } } }, { "category": "product_version", "name": "krb5-server-0:1.3.4-12.x86_64", "product": { "name": "krb5-server-0:1.3.4-12.x86_64", "product_id": "krb5-server-0:1.3.4-12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.3.4-12?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "krb5-0:1.2.7-42.src", "product": { "name": "krb5-0:1.2.7-42.src", "product_id": "krb5-0:1.2.7-42.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5@1.2.7-42?arch=src" } } }, { "category": "product_version", "name": "krb5-0:1.3.4-12.src", "product": { "name": "krb5-0:1.3.4-12.src", "product_id": "krb5-0:1.3.4-12.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5@1.3.4-12?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "krb5-workstation-0:1.2.7-42.ppc", "product": { "name": "krb5-workstation-0:1.2.7-42.ppc", "product_id": "krb5-workstation-0:1.2.7-42.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-42?arch=ppc" } } }, { "category": "product_version", "name": "krb5-libs-0:1.2.7-42.ppc", "product": { "name": "krb5-libs-0:1.2.7-42.ppc", "product_id": "krb5-libs-0:1.2.7-42.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.2.7-42?arch=ppc" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.2.7-42.ppc", "product": { "name": "krb5-debuginfo-0:1.2.7-42.ppc", "product_id": "krb5-debuginfo-0:1.2.7-42.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-42?arch=ppc" } } }, { "category": "product_version", "name": "krb5-devel-0:1.2.7-42.ppc", "product": { "name": "krb5-devel-0:1.2.7-42.ppc", "product_id": "krb5-devel-0:1.2.7-42.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.2.7-42?arch=ppc" } } }, { "category": "product_version", "name": "krb5-server-0:1.2.7-42.ppc", "product": { "name": "krb5-server-0:1.2.7-42.ppc", "product_id": "krb5-server-0:1.2.7-42.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.2.7-42?arch=ppc" } } }, { "category": "product_version", "name": "krb5-libs-0:1.3.4-12.ppc", "product": { "name": "krb5-libs-0:1.3.4-12.ppc", "product_id": "krb5-libs-0:1.3.4-12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.3.4-12?arch=ppc" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.3.4-12.ppc", "product": { "name": "krb5-workstation-0:1.3.4-12.ppc", "product_id": "krb5-workstation-0:1.3.4-12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-12?arch=ppc" } } }, { "category": "product_version", "name": "krb5-devel-0:1.3.4-12.ppc", "product": { "name": "krb5-devel-0:1.3.4-12.ppc", "product_id": "krb5-devel-0:1.3.4-12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.3.4-12?arch=ppc" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.3.4-12.ppc", "product": { "name": "krb5-debuginfo-0:1.3.4-12.ppc", "product_id": "krb5-debuginfo-0:1.3.4-12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-12?arch=ppc" } } }, { "category": "product_version", "name": "krb5-server-0:1.3.4-12.ppc", "product": { "name": "krb5-server-0:1.3.4-12.ppc", "product_id": "krb5-server-0:1.3.4-12.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.3.4-12?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.2.7-42.ppc64", "product": { "name": "krb5-libs-0:1.2.7-42.ppc64", "product_id": "krb5-libs-0:1.2.7-42.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.2.7-42?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.2.7-42.ppc64", "product": { "name": "krb5-debuginfo-0:1.2.7-42.ppc64", "product_id": "krb5-debuginfo-0:1.2.7-42.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-42?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-libs-0:1.3.4-12.ppc64", "product": { "name": "krb5-libs-0:1.3.4-12.ppc64", "product_id": "krb5-libs-0:1.3.4-12.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.3.4-12?arch=ppc64" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.3.4-12.ppc64", "product": { "name": "krb5-debuginfo-0:1.3.4-12.ppc64", "product_id": "krb5-debuginfo-0:1.3.4-12.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-12?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "krb5-workstation-0:1.2.7-42.s390x", "product": { "name": "krb5-workstation-0:1.2.7-42.s390x", "product_id": "krb5-workstation-0:1.2.7-42.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-42?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-0:1.2.7-42.s390x", "product": { "name": "krb5-libs-0:1.2.7-42.s390x", "product_id": "krb5-libs-0:1.2.7-42.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.2.7-42?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.2.7-42.s390x", "product": { "name": "krb5-debuginfo-0:1.2.7-42.s390x", "product_id": "krb5-debuginfo-0:1.2.7-42.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-42?arch=s390x" } } }, { "category": "product_version", "name": "krb5-devel-0:1.2.7-42.s390x", "product": { "name": "krb5-devel-0:1.2.7-42.s390x", "product_id": "krb5-devel-0:1.2.7-42.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.2.7-42?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-0:1.2.7-42.s390x", "product": { "name": "krb5-server-0:1.2.7-42.s390x", "product_id": "krb5-server-0:1.2.7-42.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.2.7-42?arch=s390x" } } }, { "category": "product_version", "name": "krb5-libs-0:1.3.4-12.s390x", "product": { "name": "krb5-libs-0:1.3.4-12.s390x", "product_id": "krb5-libs-0:1.3.4-12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.3.4-12?arch=s390x" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.3.4-12.s390x", "product": { "name": "krb5-workstation-0:1.3.4-12.s390x", "product_id": "krb5-workstation-0:1.3.4-12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-12?arch=s390x" } } }, { "category": "product_version", "name": "krb5-devel-0:1.3.4-12.s390x", "product": { "name": "krb5-devel-0:1.3.4-12.s390x", "product_id": "krb5-devel-0:1.3.4-12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.3.4-12?arch=s390x" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.3.4-12.s390x", "product": { "name": "krb5-debuginfo-0:1.3.4-12.s390x", "product_id": "krb5-debuginfo-0:1.3.4-12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-12?arch=s390x" } } }, { "category": "product_version", "name": "krb5-server-0:1.3.4-12.s390x", "product": { "name": "krb5-server-0:1.3.4-12.s390x", "product_id": "krb5-server-0:1.3.4-12.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.3.4-12?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "krb5-libs-0:1.2.7-42.s390", "product": { "name": "krb5-libs-0:1.2.7-42.s390", "product_id": "krb5-libs-0:1.2.7-42.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.2.7-42?arch=s390" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.2.7-42.s390", "product": { "name": "krb5-debuginfo-0:1.2.7-42.s390", "product_id": "krb5-debuginfo-0:1.2.7-42.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.2.7-42?arch=s390" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.2.7-42.s390", "product": { "name": "krb5-workstation-0:1.2.7-42.s390", "product_id": "krb5-workstation-0:1.2.7-42.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.2.7-42?arch=s390" } } }, { "category": "product_version", "name": "krb5-devel-0:1.2.7-42.s390", "product": { "name": "krb5-devel-0:1.2.7-42.s390", "product_id": "krb5-devel-0:1.2.7-42.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.2.7-42?arch=s390" } } }, { "category": "product_version", "name": "krb5-server-0:1.2.7-42.s390", "product": { "name": "krb5-server-0:1.2.7-42.s390", "product_id": "krb5-server-0:1.2.7-42.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.2.7-42?arch=s390" } } }, { "category": "product_version", "name": "krb5-libs-0:1.3.4-12.s390", "product": { "name": "krb5-libs-0:1.3.4-12.s390", "product_id": "krb5-libs-0:1.3.4-12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-libs@1.3.4-12?arch=s390" } } }, { "category": "product_version", "name": "krb5-debuginfo-0:1.3.4-12.s390", "product": { "name": "krb5-debuginfo-0:1.3.4-12.s390", "product_id": "krb5-debuginfo-0:1.3.4-12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-debuginfo@1.3.4-12?arch=s390" } } }, { "category": "product_version", "name": "krb5-workstation-0:1.3.4-12.s390", "product": { "name": "krb5-workstation-0:1.3.4-12.s390", "product_id": "krb5-workstation-0:1.3.4-12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-workstation@1.3.4-12?arch=s390" } } }, { "category": "product_version", "name": "krb5-devel-0:1.3.4-12.s390", "product": { "name": "krb5-devel-0:1.3.4-12.s390", "product_id": "krb5-devel-0:1.3.4-12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-devel@1.3.4-12?arch=s390" } } }, { "category": "product_version", "name": "krb5-server-0:1.3.4-12.s390", "product": { "name": "krb5-server-0:1.3.4-12.s390", "product_id": "krb5-server-0:1.3.4-12.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/krb5-server@1.3.4-12?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.2.7-42.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-0:1.2.7-42.src" }, "product_reference": "krb5-0:1.2.7-42.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-debuginfo-0:1.2.7-42.i386" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-debuginfo-0:1.2.7-42.ia64" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-debuginfo-0:1.2.7-42.ppc" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-debuginfo-0:1.2.7-42.ppc64" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-debuginfo-0:1.2.7-42.s390" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-debuginfo-0:1.2.7-42.s390x" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-debuginfo-0:1.2.7-42.x86_64" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-devel-0:1.2.7-42.i386" }, "product_reference": "krb5-devel-0:1.2.7-42.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-devel-0:1.2.7-42.ia64" }, "product_reference": "krb5-devel-0:1.2.7-42.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-devel-0:1.2.7-42.ppc" }, "product_reference": "krb5-devel-0:1.2.7-42.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-devel-0:1.2.7-42.s390" }, "product_reference": "krb5-devel-0:1.2.7-42.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-devel-0:1.2.7-42.s390x" }, "product_reference": "krb5-devel-0:1.2.7-42.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-devel-0:1.2.7-42.x86_64" }, "product_reference": "krb5-devel-0:1.2.7-42.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-libs-0:1.2.7-42.i386" }, "product_reference": "krb5-libs-0:1.2.7-42.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-libs-0:1.2.7-42.ia64" }, "product_reference": "krb5-libs-0:1.2.7-42.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-libs-0:1.2.7-42.ppc" }, "product_reference": "krb5-libs-0:1.2.7-42.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-libs-0:1.2.7-42.ppc64" }, "product_reference": "krb5-libs-0:1.2.7-42.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-libs-0:1.2.7-42.s390" }, "product_reference": "krb5-libs-0:1.2.7-42.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-libs-0:1.2.7-42.s390x" }, "product_reference": "krb5-libs-0:1.2.7-42.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-libs-0:1.2.7-42.x86_64" }, "product_reference": "krb5-libs-0:1.2.7-42.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-server-0:1.2.7-42.i386" }, "product_reference": "krb5-server-0:1.2.7-42.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-server-0:1.2.7-42.ia64" }, "product_reference": "krb5-server-0:1.2.7-42.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-server-0:1.2.7-42.ppc" }, "product_reference": "krb5-server-0:1.2.7-42.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-server-0:1.2.7-42.s390" }, "product_reference": "krb5-server-0:1.2.7-42.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-server-0:1.2.7-42.s390x" }, "product_reference": "krb5-server-0:1.2.7-42.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-server-0:1.2.7-42.x86_64" }, "product_reference": "krb5-server-0:1.2.7-42.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-workstation-0:1.2.7-42.i386" }, "product_reference": "krb5-workstation-0:1.2.7-42.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-workstation-0:1.2.7-42.ia64" }, "product_reference": "krb5-workstation-0:1.2.7-42.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-workstation-0:1.2.7-42.ppc" }, "product_reference": "krb5-workstation-0:1.2.7-42.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-workstation-0:1.2.7-42.s390" }, "product_reference": "krb5-workstation-0:1.2.7-42.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-workstation-0:1.2.7-42.s390x" }, "product_reference": "krb5-workstation-0:1.2.7-42.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:krb5-workstation-0:1.2.7-42.x86_64" }, "product_reference": "krb5-workstation-0:1.2.7-42.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.2.7-42.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-0:1.2.7-42.src" }, "product_reference": "krb5-0:1.2.7-42.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-debuginfo-0:1.2.7-42.i386" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-debuginfo-0:1.2.7-42.ia64" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-debuginfo-0:1.2.7-42.ppc" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-debuginfo-0:1.2.7-42.ppc64" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-debuginfo-0:1.2.7-42.s390" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-debuginfo-0:1.2.7-42.s390x" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-debuginfo-0:1.2.7-42.x86_64" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-devel-0:1.2.7-42.i386" }, "product_reference": "krb5-devel-0:1.2.7-42.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-devel-0:1.2.7-42.ia64" }, "product_reference": "krb5-devel-0:1.2.7-42.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-devel-0:1.2.7-42.ppc" }, "product_reference": "krb5-devel-0:1.2.7-42.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-devel-0:1.2.7-42.s390" }, "product_reference": "krb5-devel-0:1.2.7-42.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-devel-0:1.2.7-42.s390x" }, "product_reference": "krb5-devel-0:1.2.7-42.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-devel-0:1.2.7-42.x86_64" }, "product_reference": "krb5-devel-0:1.2.7-42.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-libs-0:1.2.7-42.i386" }, "product_reference": "krb5-libs-0:1.2.7-42.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-libs-0:1.2.7-42.ia64" }, "product_reference": "krb5-libs-0:1.2.7-42.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-libs-0:1.2.7-42.ppc" }, "product_reference": "krb5-libs-0:1.2.7-42.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-libs-0:1.2.7-42.ppc64" }, "product_reference": "krb5-libs-0:1.2.7-42.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-libs-0:1.2.7-42.s390" }, "product_reference": "krb5-libs-0:1.2.7-42.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-libs-0:1.2.7-42.s390x" }, "product_reference": "krb5-libs-0:1.2.7-42.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-libs-0:1.2.7-42.x86_64" }, "product_reference": "krb5-libs-0:1.2.7-42.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-server-0:1.2.7-42.i386" }, "product_reference": "krb5-server-0:1.2.7-42.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-server-0:1.2.7-42.ia64" }, "product_reference": "krb5-server-0:1.2.7-42.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-server-0:1.2.7-42.ppc" }, "product_reference": "krb5-server-0:1.2.7-42.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-server-0:1.2.7-42.s390" }, "product_reference": "krb5-server-0:1.2.7-42.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-server-0:1.2.7-42.s390x" }, "product_reference": "krb5-server-0:1.2.7-42.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-server-0:1.2.7-42.x86_64" }, "product_reference": "krb5-server-0:1.2.7-42.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-workstation-0:1.2.7-42.i386" }, "product_reference": "krb5-workstation-0:1.2.7-42.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-workstation-0:1.2.7-42.ia64" }, "product_reference": "krb5-workstation-0:1.2.7-42.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-workstation-0:1.2.7-42.ppc" }, "product_reference": "krb5-workstation-0:1.2.7-42.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-workstation-0:1.2.7-42.s390" }, "product_reference": "krb5-workstation-0:1.2.7-42.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-workstation-0:1.2.7-42.s390x" }, "product_reference": "krb5-workstation-0:1.2.7-42.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:krb5-workstation-0:1.2.7-42.x86_64" }, "product_reference": "krb5-workstation-0:1.2.7-42.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.2.7-42.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-0:1.2.7-42.src" }, "product_reference": "krb5-0:1.2.7-42.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-debuginfo-0:1.2.7-42.i386" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-debuginfo-0:1.2.7-42.ia64" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-debuginfo-0:1.2.7-42.ppc" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-debuginfo-0:1.2.7-42.ppc64" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-debuginfo-0:1.2.7-42.s390" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-debuginfo-0:1.2.7-42.s390x" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-debuginfo-0:1.2.7-42.x86_64" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-devel-0:1.2.7-42.i386" }, "product_reference": "krb5-devel-0:1.2.7-42.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-devel-0:1.2.7-42.ia64" }, "product_reference": "krb5-devel-0:1.2.7-42.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-devel-0:1.2.7-42.ppc" }, "product_reference": "krb5-devel-0:1.2.7-42.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-devel-0:1.2.7-42.s390" }, "product_reference": "krb5-devel-0:1.2.7-42.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-devel-0:1.2.7-42.s390x" }, "product_reference": "krb5-devel-0:1.2.7-42.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-devel-0:1.2.7-42.x86_64" }, "product_reference": "krb5-devel-0:1.2.7-42.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-libs-0:1.2.7-42.i386" }, "product_reference": "krb5-libs-0:1.2.7-42.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-libs-0:1.2.7-42.ia64" }, "product_reference": "krb5-libs-0:1.2.7-42.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-libs-0:1.2.7-42.ppc" }, "product_reference": "krb5-libs-0:1.2.7-42.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-libs-0:1.2.7-42.ppc64" }, "product_reference": "krb5-libs-0:1.2.7-42.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-libs-0:1.2.7-42.s390" }, "product_reference": "krb5-libs-0:1.2.7-42.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-libs-0:1.2.7-42.s390x" }, "product_reference": "krb5-libs-0:1.2.7-42.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-libs-0:1.2.7-42.x86_64" }, "product_reference": "krb5-libs-0:1.2.7-42.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-server-0:1.2.7-42.i386" }, "product_reference": "krb5-server-0:1.2.7-42.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-server-0:1.2.7-42.ia64" }, "product_reference": "krb5-server-0:1.2.7-42.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-server-0:1.2.7-42.ppc" }, "product_reference": "krb5-server-0:1.2.7-42.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-server-0:1.2.7-42.s390" }, "product_reference": "krb5-server-0:1.2.7-42.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-server-0:1.2.7-42.s390x" }, "product_reference": "krb5-server-0:1.2.7-42.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-server-0:1.2.7-42.x86_64" }, "product_reference": "krb5-server-0:1.2.7-42.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-workstation-0:1.2.7-42.i386" }, "product_reference": "krb5-workstation-0:1.2.7-42.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-workstation-0:1.2.7-42.ia64" }, "product_reference": "krb5-workstation-0:1.2.7-42.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-workstation-0:1.2.7-42.ppc" }, "product_reference": "krb5-workstation-0:1.2.7-42.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-workstation-0:1.2.7-42.s390" }, "product_reference": "krb5-workstation-0:1.2.7-42.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-workstation-0:1.2.7-42.s390x" }, "product_reference": "krb5-workstation-0:1.2.7-42.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:krb5-workstation-0:1.2.7-42.x86_64" }, "product_reference": "krb5-workstation-0:1.2.7-42.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.2.7-42.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-0:1.2.7-42.src" }, "product_reference": "krb5-0:1.2.7-42.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-debuginfo-0:1.2.7-42.i386" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-debuginfo-0:1.2.7-42.ia64" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-debuginfo-0:1.2.7-42.ppc" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-debuginfo-0:1.2.7-42.ppc64" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-debuginfo-0:1.2.7-42.s390" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-debuginfo-0:1.2.7-42.s390x" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.2.7-42.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-debuginfo-0:1.2.7-42.x86_64" }, "product_reference": "krb5-debuginfo-0:1.2.7-42.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-devel-0:1.2.7-42.i386" }, "product_reference": "krb5-devel-0:1.2.7-42.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-devel-0:1.2.7-42.ia64" }, "product_reference": "krb5-devel-0:1.2.7-42.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-devel-0:1.2.7-42.ppc" }, "product_reference": "krb5-devel-0:1.2.7-42.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-devel-0:1.2.7-42.s390" }, "product_reference": "krb5-devel-0:1.2.7-42.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-devel-0:1.2.7-42.s390x" }, "product_reference": "krb5-devel-0:1.2.7-42.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.2.7-42.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-devel-0:1.2.7-42.x86_64" }, "product_reference": "krb5-devel-0:1.2.7-42.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-libs-0:1.2.7-42.i386" }, "product_reference": "krb5-libs-0:1.2.7-42.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-libs-0:1.2.7-42.ia64" }, "product_reference": "krb5-libs-0:1.2.7-42.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-libs-0:1.2.7-42.ppc" }, "product_reference": "krb5-libs-0:1.2.7-42.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-libs-0:1.2.7-42.ppc64" }, "product_reference": "krb5-libs-0:1.2.7-42.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-libs-0:1.2.7-42.s390" }, "product_reference": "krb5-libs-0:1.2.7-42.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-libs-0:1.2.7-42.s390x" }, "product_reference": "krb5-libs-0:1.2.7-42.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.2.7-42.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-libs-0:1.2.7-42.x86_64" }, "product_reference": "krb5-libs-0:1.2.7-42.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-server-0:1.2.7-42.i386" }, "product_reference": "krb5-server-0:1.2.7-42.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-server-0:1.2.7-42.ia64" }, "product_reference": "krb5-server-0:1.2.7-42.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-server-0:1.2.7-42.ppc" }, "product_reference": "krb5-server-0:1.2.7-42.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-server-0:1.2.7-42.s390" }, "product_reference": "krb5-server-0:1.2.7-42.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-server-0:1.2.7-42.s390x" }, "product_reference": "krb5-server-0:1.2.7-42.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.2.7-42.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-server-0:1.2.7-42.x86_64" }, "product_reference": "krb5-server-0:1.2.7-42.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-workstation-0:1.2.7-42.i386" }, "product_reference": "krb5-workstation-0:1.2.7-42.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-workstation-0:1.2.7-42.ia64" }, "product_reference": "krb5-workstation-0:1.2.7-42.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-workstation-0:1.2.7-42.ppc" }, "product_reference": "krb5-workstation-0:1.2.7-42.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-workstation-0:1.2.7-42.s390" }, "product_reference": "krb5-workstation-0:1.2.7-42.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-workstation-0:1.2.7-42.s390x" }, "product_reference": "krb5-workstation-0:1.2.7-42.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.2.7-42.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:krb5-workstation-0:1.2.7-42.x86_64" }, "product_reference": "krb5-workstation-0:1.2.7-42.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.3.4-12.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-0:1.3.4-12.src" }, "product_reference": "krb5-0:1.3.4-12.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-debuginfo-0:1.3.4-12.i386" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-debuginfo-0:1.3.4-12.ia64" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-debuginfo-0:1.3.4-12.ppc" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-debuginfo-0:1.3.4-12.ppc64" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-debuginfo-0:1.3.4-12.s390" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-debuginfo-0:1.3.4-12.s390x" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-debuginfo-0:1.3.4-12.x86_64" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-devel-0:1.3.4-12.i386" }, "product_reference": "krb5-devel-0:1.3.4-12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-devel-0:1.3.4-12.ia64" }, "product_reference": "krb5-devel-0:1.3.4-12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-devel-0:1.3.4-12.ppc" }, "product_reference": "krb5-devel-0:1.3.4-12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-devel-0:1.3.4-12.s390" }, "product_reference": "krb5-devel-0:1.3.4-12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-devel-0:1.3.4-12.s390x" }, "product_reference": "krb5-devel-0:1.3.4-12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-devel-0:1.3.4-12.x86_64" }, "product_reference": "krb5-devel-0:1.3.4-12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-libs-0:1.3.4-12.i386" }, "product_reference": "krb5-libs-0:1.3.4-12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-libs-0:1.3.4-12.ia64" }, "product_reference": "krb5-libs-0:1.3.4-12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-libs-0:1.3.4-12.ppc" }, "product_reference": "krb5-libs-0:1.3.4-12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-libs-0:1.3.4-12.ppc64" }, "product_reference": "krb5-libs-0:1.3.4-12.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-libs-0:1.3.4-12.s390" }, "product_reference": "krb5-libs-0:1.3.4-12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-libs-0:1.3.4-12.s390x" }, "product_reference": "krb5-libs-0:1.3.4-12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-libs-0:1.3.4-12.x86_64" }, "product_reference": "krb5-libs-0:1.3.4-12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-server-0:1.3.4-12.i386" }, "product_reference": "krb5-server-0:1.3.4-12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-server-0:1.3.4-12.ia64" }, "product_reference": "krb5-server-0:1.3.4-12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-server-0:1.3.4-12.ppc" }, "product_reference": "krb5-server-0:1.3.4-12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-server-0:1.3.4-12.s390" }, "product_reference": "krb5-server-0:1.3.4-12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-server-0:1.3.4-12.s390x" }, "product_reference": "krb5-server-0:1.3.4-12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-server-0:1.3.4-12.x86_64" }, "product_reference": "krb5-server-0:1.3.4-12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-workstation-0:1.3.4-12.i386" }, "product_reference": "krb5-workstation-0:1.3.4-12.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-workstation-0:1.3.4-12.ia64" }, "product_reference": "krb5-workstation-0:1.3.4-12.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-workstation-0:1.3.4-12.ppc" }, "product_reference": "krb5-workstation-0:1.3.4-12.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-workstation-0:1.3.4-12.s390" }, "product_reference": "krb5-workstation-0:1.3.4-12.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-workstation-0:1.3.4-12.s390x" }, "product_reference": "krb5-workstation-0:1.3.4-12.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:krb5-workstation-0:1.3.4-12.x86_64" }, "product_reference": "krb5-workstation-0:1.3.4-12.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.3.4-12.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-0:1.3.4-12.src" }, "product_reference": "krb5-0:1.3.4-12.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-debuginfo-0:1.3.4-12.i386" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-debuginfo-0:1.3.4-12.ia64" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-debuginfo-0:1.3.4-12.ppc" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-debuginfo-0:1.3.4-12.ppc64" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-debuginfo-0:1.3.4-12.s390" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-debuginfo-0:1.3.4-12.s390x" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-debuginfo-0:1.3.4-12.x86_64" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-devel-0:1.3.4-12.i386" }, "product_reference": "krb5-devel-0:1.3.4-12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-devel-0:1.3.4-12.ia64" }, "product_reference": "krb5-devel-0:1.3.4-12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-devel-0:1.3.4-12.ppc" }, "product_reference": "krb5-devel-0:1.3.4-12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-devel-0:1.3.4-12.s390" }, "product_reference": "krb5-devel-0:1.3.4-12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-devel-0:1.3.4-12.s390x" }, "product_reference": "krb5-devel-0:1.3.4-12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-devel-0:1.3.4-12.x86_64" }, "product_reference": "krb5-devel-0:1.3.4-12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-libs-0:1.3.4-12.i386" }, "product_reference": "krb5-libs-0:1.3.4-12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-libs-0:1.3.4-12.ia64" }, "product_reference": "krb5-libs-0:1.3.4-12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-libs-0:1.3.4-12.ppc" }, "product_reference": "krb5-libs-0:1.3.4-12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-libs-0:1.3.4-12.ppc64" }, "product_reference": "krb5-libs-0:1.3.4-12.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-libs-0:1.3.4-12.s390" }, "product_reference": "krb5-libs-0:1.3.4-12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-libs-0:1.3.4-12.s390x" }, "product_reference": "krb5-libs-0:1.3.4-12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-libs-0:1.3.4-12.x86_64" }, "product_reference": "krb5-libs-0:1.3.4-12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-server-0:1.3.4-12.i386" }, "product_reference": "krb5-server-0:1.3.4-12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-server-0:1.3.4-12.ia64" }, "product_reference": "krb5-server-0:1.3.4-12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-server-0:1.3.4-12.ppc" }, "product_reference": "krb5-server-0:1.3.4-12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-server-0:1.3.4-12.s390" }, "product_reference": "krb5-server-0:1.3.4-12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-server-0:1.3.4-12.s390x" }, "product_reference": "krb5-server-0:1.3.4-12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-server-0:1.3.4-12.x86_64" }, "product_reference": "krb5-server-0:1.3.4-12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-workstation-0:1.3.4-12.i386" }, "product_reference": "krb5-workstation-0:1.3.4-12.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-workstation-0:1.3.4-12.ia64" }, "product_reference": "krb5-workstation-0:1.3.4-12.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-workstation-0:1.3.4-12.ppc" }, "product_reference": "krb5-workstation-0:1.3.4-12.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-workstation-0:1.3.4-12.s390" }, "product_reference": "krb5-workstation-0:1.3.4-12.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-workstation-0:1.3.4-12.s390x" }, "product_reference": "krb5-workstation-0:1.3.4-12.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:krb5-workstation-0:1.3.4-12.x86_64" }, "product_reference": "krb5-workstation-0:1.3.4-12.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.3.4-12.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-0:1.3.4-12.src" }, "product_reference": "krb5-0:1.3.4-12.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-debuginfo-0:1.3.4-12.i386" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-debuginfo-0:1.3.4-12.ia64" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-debuginfo-0:1.3.4-12.ppc" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-debuginfo-0:1.3.4-12.ppc64" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-debuginfo-0:1.3.4-12.s390" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-debuginfo-0:1.3.4-12.s390x" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-debuginfo-0:1.3.4-12.x86_64" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-devel-0:1.3.4-12.i386" }, "product_reference": "krb5-devel-0:1.3.4-12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-devel-0:1.3.4-12.ia64" }, "product_reference": "krb5-devel-0:1.3.4-12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-devel-0:1.3.4-12.ppc" }, "product_reference": "krb5-devel-0:1.3.4-12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-devel-0:1.3.4-12.s390" }, "product_reference": "krb5-devel-0:1.3.4-12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-devel-0:1.3.4-12.s390x" }, "product_reference": "krb5-devel-0:1.3.4-12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-devel-0:1.3.4-12.x86_64" }, "product_reference": "krb5-devel-0:1.3.4-12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-libs-0:1.3.4-12.i386" }, "product_reference": "krb5-libs-0:1.3.4-12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-libs-0:1.3.4-12.ia64" }, "product_reference": "krb5-libs-0:1.3.4-12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-libs-0:1.3.4-12.ppc" }, "product_reference": "krb5-libs-0:1.3.4-12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-libs-0:1.3.4-12.ppc64" }, "product_reference": "krb5-libs-0:1.3.4-12.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-libs-0:1.3.4-12.s390" }, "product_reference": "krb5-libs-0:1.3.4-12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-libs-0:1.3.4-12.s390x" }, "product_reference": "krb5-libs-0:1.3.4-12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-libs-0:1.3.4-12.x86_64" }, "product_reference": "krb5-libs-0:1.3.4-12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-server-0:1.3.4-12.i386" }, "product_reference": "krb5-server-0:1.3.4-12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-server-0:1.3.4-12.ia64" }, "product_reference": "krb5-server-0:1.3.4-12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-server-0:1.3.4-12.ppc" }, "product_reference": "krb5-server-0:1.3.4-12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-server-0:1.3.4-12.s390" }, "product_reference": "krb5-server-0:1.3.4-12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-server-0:1.3.4-12.s390x" }, "product_reference": "krb5-server-0:1.3.4-12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-server-0:1.3.4-12.x86_64" }, "product_reference": "krb5-server-0:1.3.4-12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-workstation-0:1.3.4-12.i386" }, "product_reference": "krb5-workstation-0:1.3.4-12.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-workstation-0:1.3.4-12.ia64" }, "product_reference": "krb5-workstation-0:1.3.4-12.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-workstation-0:1.3.4-12.ppc" }, "product_reference": "krb5-workstation-0:1.3.4-12.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-workstation-0:1.3.4-12.s390" }, "product_reference": "krb5-workstation-0:1.3.4-12.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-workstation-0:1.3.4-12.s390x" }, "product_reference": "krb5-workstation-0:1.3.4-12.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:krb5-workstation-0:1.3.4-12.x86_64" }, "product_reference": "krb5-workstation-0:1.3.4-12.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-0:1.3.4-12.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-0:1.3.4-12.src" }, "product_reference": "krb5-0:1.3.4-12.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-debuginfo-0:1.3.4-12.i386" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-debuginfo-0:1.3.4-12.ia64" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-debuginfo-0:1.3.4-12.ppc" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-debuginfo-0:1.3.4-12.ppc64" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-debuginfo-0:1.3.4-12.s390" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-debuginfo-0:1.3.4-12.s390x" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-debuginfo-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-debuginfo-0:1.3.4-12.x86_64" }, "product_reference": "krb5-debuginfo-0:1.3.4-12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-devel-0:1.3.4-12.i386" }, "product_reference": "krb5-devel-0:1.3.4-12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-devel-0:1.3.4-12.ia64" }, "product_reference": "krb5-devel-0:1.3.4-12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-devel-0:1.3.4-12.ppc" }, "product_reference": "krb5-devel-0:1.3.4-12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-devel-0:1.3.4-12.s390" }, "product_reference": "krb5-devel-0:1.3.4-12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-devel-0:1.3.4-12.s390x" }, "product_reference": "krb5-devel-0:1.3.4-12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-devel-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-devel-0:1.3.4-12.x86_64" }, "product_reference": "krb5-devel-0:1.3.4-12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-libs-0:1.3.4-12.i386" }, "product_reference": "krb5-libs-0:1.3.4-12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-libs-0:1.3.4-12.ia64" }, "product_reference": "krb5-libs-0:1.3.4-12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-libs-0:1.3.4-12.ppc" }, "product_reference": "krb5-libs-0:1.3.4-12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-libs-0:1.3.4-12.ppc64" }, "product_reference": "krb5-libs-0:1.3.4-12.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-libs-0:1.3.4-12.s390" }, "product_reference": "krb5-libs-0:1.3.4-12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-libs-0:1.3.4-12.s390x" }, "product_reference": "krb5-libs-0:1.3.4-12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-libs-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-libs-0:1.3.4-12.x86_64" }, "product_reference": "krb5-libs-0:1.3.4-12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-server-0:1.3.4-12.i386" }, "product_reference": "krb5-server-0:1.3.4-12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-server-0:1.3.4-12.ia64" }, "product_reference": "krb5-server-0:1.3.4-12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-server-0:1.3.4-12.ppc" }, "product_reference": "krb5-server-0:1.3.4-12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-server-0:1.3.4-12.s390" }, "product_reference": "krb5-server-0:1.3.4-12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-server-0:1.3.4-12.s390x" }, "product_reference": "krb5-server-0:1.3.4-12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-server-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-server-0:1.3.4-12.x86_64" }, "product_reference": "krb5-server-0:1.3.4-12.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-workstation-0:1.3.4-12.i386" }, "product_reference": "krb5-workstation-0:1.3.4-12.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-workstation-0:1.3.4-12.ia64" }, "product_reference": "krb5-workstation-0:1.3.4-12.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-workstation-0:1.3.4-12.ppc" }, "product_reference": "krb5-workstation-0:1.3.4-12.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-workstation-0:1.3.4-12.s390" }, "product_reference": "krb5-workstation-0:1.3.4-12.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-workstation-0:1.3.4-12.s390x" }, "product_reference": "krb5-workstation-0:1.3.4-12.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "krb5-workstation-0:1.3.4-12.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:krb5-workstation-0:1.3.4-12.x86_64" }, "product_reference": "krb5-workstation-0:1.3.4-12.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "iDefense" ] } ], "cve": "CVE-2005-0468", "discovery_date": "2005-02-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617527" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:krb5-0:1.2.7-42.src", "3AS:krb5-debuginfo-0:1.2.7-42.i386", "3AS:krb5-debuginfo-0:1.2.7-42.ia64", "3AS:krb5-debuginfo-0:1.2.7-42.ppc", "3AS:krb5-debuginfo-0:1.2.7-42.ppc64", "3AS:krb5-debuginfo-0:1.2.7-42.s390", "3AS:krb5-debuginfo-0:1.2.7-42.s390x", "3AS:krb5-debuginfo-0:1.2.7-42.x86_64", "3AS:krb5-devel-0:1.2.7-42.i386", "3AS:krb5-devel-0:1.2.7-42.ia64", "3AS:krb5-devel-0:1.2.7-42.ppc", "3AS:krb5-devel-0:1.2.7-42.s390", "3AS:krb5-devel-0:1.2.7-42.s390x", "3AS:krb5-devel-0:1.2.7-42.x86_64", "3AS:krb5-libs-0:1.2.7-42.i386", "3AS:krb5-libs-0:1.2.7-42.ia64", "3AS:krb5-libs-0:1.2.7-42.ppc", "3AS:krb5-libs-0:1.2.7-42.ppc64", "3AS:krb5-libs-0:1.2.7-42.s390", "3AS:krb5-libs-0:1.2.7-42.s390x", "3AS:krb5-libs-0:1.2.7-42.x86_64", "3AS:krb5-server-0:1.2.7-42.i386", "3AS:krb5-server-0:1.2.7-42.ia64", "3AS:krb5-server-0:1.2.7-42.ppc", "3AS:krb5-server-0:1.2.7-42.s390", "3AS:krb5-server-0:1.2.7-42.s390x", "3AS:krb5-server-0:1.2.7-42.x86_64", "3AS:krb5-workstation-0:1.2.7-42.i386", "3AS:krb5-workstation-0:1.2.7-42.ia64", "3AS:krb5-workstation-0:1.2.7-42.ppc", "3AS:krb5-workstation-0:1.2.7-42.s390", "3AS:krb5-workstation-0:1.2.7-42.s390x", "3AS:krb5-workstation-0:1.2.7-42.x86_64", "3Desktop:krb5-0:1.2.7-42.src", "3Desktop:krb5-debuginfo-0:1.2.7-42.i386", "3Desktop:krb5-debuginfo-0:1.2.7-42.ia64", "3Desktop:krb5-debuginfo-0:1.2.7-42.ppc", "3Desktop:krb5-debuginfo-0:1.2.7-42.ppc64", "3Desktop:krb5-debuginfo-0:1.2.7-42.s390", "3Desktop:krb5-debuginfo-0:1.2.7-42.s390x", "3Desktop:krb5-debuginfo-0:1.2.7-42.x86_64", "3Desktop:krb5-devel-0:1.2.7-42.i386", "3Desktop:krb5-devel-0:1.2.7-42.ia64", "3Desktop:krb5-devel-0:1.2.7-42.ppc", "3Desktop:krb5-devel-0:1.2.7-42.s390", "3Desktop:krb5-devel-0:1.2.7-42.s390x", "3Desktop:krb5-devel-0:1.2.7-42.x86_64", "3Desktop:krb5-libs-0:1.2.7-42.i386", "3Desktop:krb5-libs-0:1.2.7-42.ia64", "3Desktop:krb5-libs-0:1.2.7-42.ppc", "3Desktop:krb5-libs-0:1.2.7-42.ppc64", "3Desktop:krb5-libs-0:1.2.7-42.s390", "3Desktop:krb5-libs-0:1.2.7-42.s390x", "3Desktop:krb5-libs-0:1.2.7-42.x86_64", "3Desktop:krb5-server-0:1.2.7-42.i386", "3Desktop:krb5-server-0:1.2.7-42.ia64", "3Desktop:krb5-server-0:1.2.7-42.ppc", "3Desktop:krb5-server-0:1.2.7-42.s390", "3Desktop:krb5-server-0:1.2.7-42.s390x", "3Desktop:krb5-server-0:1.2.7-42.x86_64", "3Desktop:krb5-workstation-0:1.2.7-42.i386", "3Desktop:krb5-workstation-0:1.2.7-42.ia64", "3Desktop:krb5-workstation-0:1.2.7-42.ppc", "3Desktop:krb5-workstation-0:1.2.7-42.s390", "3Desktop:krb5-workstation-0:1.2.7-42.s390x", "3Desktop:krb5-workstation-0:1.2.7-42.x86_64", "3ES:krb5-0:1.2.7-42.src", "3ES:krb5-debuginfo-0:1.2.7-42.i386", "3ES:krb5-debuginfo-0:1.2.7-42.ia64", "3ES:krb5-debuginfo-0:1.2.7-42.ppc", "3ES:krb5-debuginfo-0:1.2.7-42.ppc64", "3ES:krb5-debuginfo-0:1.2.7-42.s390", "3ES:krb5-debuginfo-0:1.2.7-42.s390x", "3ES:krb5-debuginfo-0:1.2.7-42.x86_64", "3ES:krb5-devel-0:1.2.7-42.i386", "3ES:krb5-devel-0:1.2.7-42.ia64", "3ES:krb5-devel-0:1.2.7-42.ppc", "3ES:krb5-devel-0:1.2.7-42.s390", "3ES:krb5-devel-0:1.2.7-42.s390x", "3ES:krb5-devel-0:1.2.7-42.x86_64", "3ES:krb5-libs-0:1.2.7-42.i386", "3ES:krb5-libs-0:1.2.7-42.ia64", "3ES:krb5-libs-0:1.2.7-42.ppc", "3ES:krb5-libs-0:1.2.7-42.ppc64", "3ES:krb5-libs-0:1.2.7-42.s390", "3ES:krb5-libs-0:1.2.7-42.s390x", "3ES:krb5-libs-0:1.2.7-42.x86_64", "3ES:krb5-server-0:1.2.7-42.i386", "3ES:krb5-server-0:1.2.7-42.ia64", "3ES:krb5-server-0:1.2.7-42.ppc", "3ES:krb5-server-0:1.2.7-42.s390", "3ES:krb5-server-0:1.2.7-42.s390x", "3ES:krb5-server-0:1.2.7-42.x86_64", "3ES:krb5-workstation-0:1.2.7-42.i386", "3ES:krb5-workstation-0:1.2.7-42.ia64", "3ES:krb5-workstation-0:1.2.7-42.ppc", "3ES:krb5-workstation-0:1.2.7-42.s390", "3ES:krb5-workstation-0:1.2.7-42.s390x", "3ES:krb5-workstation-0:1.2.7-42.x86_64", "3WS:krb5-0:1.2.7-42.src", "3WS:krb5-debuginfo-0:1.2.7-42.i386", "3WS:krb5-debuginfo-0:1.2.7-42.ia64", "3WS:krb5-debuginfo-0:1.2.7-42.ppc", "3WS:krb5-debuginfo-0:1.2.7-42.ppc64", "3WS:krb5-debuginfo-0:1.2.7-42.s390", "3WS:krb5-debuginfo-0:1.2.7-42.s390x", "3WS:krb5-debuginfo-0:1.2.7-42.x86_64", "3WS:krb5-devel-0:1.2.7-42.i386", "3WS:krb5-devel-0:1.2.7-42.ia64", "3WS:krb5-devel-0:1.2.7-42.ppc", "3WS:krb5-devel-0:1.2.7-42.s390", "3WS:krb5-devel-0:1.2.7-42.s390x", "3WS:krb5-devel-0:1.2.7-42.x86_64", "3WS:krb5-libs-0:1.2.7-42.i386", "3WS:krb5-libs-0:1.2.7-42.ia64", "3WS:krb5-libs-0:1.2.7-42.ppc", "3WS:krb5-libs-0:1.2.7-42.ppc64", "3WS:krb5-libs-0:1.2.7-42.s390", "3WS:krb5-libs-0:1.2.7-42.s390x", "3WS:krb5-libs-0:1.2.7-42.x86_64", "3WS:krb5-server-0:1.2.7-42.i386", "3WS:krb5-server-0:1.2.7-42.ia64", "3WS:krb5-server-0:1.2.7-42.ppc", "3WS:krb5-server-0:1.2.7-42.s390", "3WS:krb5-server-0:1.2.7-42.s390x", "3WS:krb5-server-0:1.2.7-42.x86_64", "3WS:krb5-workstation-0:1.2.7-42.i386", "3WS:krb5-workstation-0:1.2.7-42.ia64", "3WS:krb5-workstation-0:1.2.7-42.ppc", "3WS:krb5-workstation-0:1.2.7-42.s390", "3WS:krb5-workstation-0:1.2.7-42.s390x", "3WS:krb5-workstation-0:1.2.7-42.x86_64", "4AS:krb5-0:1.3.4-12.src", "4AS:krb5-debuginfo-0:1.3.4-12.i386", "4AS:krb5-debuginfo-0:1.3.4-12.ia64", "4AS:krb5-debuginfo-0:1.3.4-12.ppc", "4AS:krb5-debuginfo-0:1.3.4-12.ppc64", "4AS:krb5-debuginfo-0:1.3.4-12.s390", "4AS:krb5-debuginfo-0:1.3.4-12.s390x", "4AS:krb5-debuginfo-0:1.3.4-12.x86_64", "4AS:krb5-devel-0:1.3.4-12.i386", "4AS:krb5-devel-0:1.3.4-12.ia64", "4AS:krb5-devel-0:1.3.4-12.ppc", "4AS:krb5-devel-0:1.3.4-12.s390", "4AS:krb5-devel-0:1.3.4-12.s390x", "4AS:krb5-devel-0:1.3.4-12.x86_64", "4AS:krb5-libs-0:1.3.4-12.i386", "4AS:krb5-libs-0:1.3.4-12.ia64", "4AS:krb5-libs-0:1.3.4-12.ppc", "4AS:krb5-libs-0:1.3.4-12.ppc64", "4AS:krb5-libs-0:1.3.4-12.s390", "4AS:krb5-libs-0:1.3.4-12.s390x", "4AS:krb5-libs-0:1.3.4-12.x86_64", "4AS:krb5-server-0:1.3.4-12.i386", "4AS:krb5-server-0:1.3.4-12.ia64", "4AS:krb5-server-0:1.3.4-12.ppc", "4AS:krb5-server-0:1.3.4-12.s390", "4AS:krb5-server-0:1.3.4-12.s390x", "4AS:krb5-server-0:1.3.4-12.x86_64", "4AS:krb5-workstation-0:1.3.4-12.i386", "4AS:krb5-workstation-0:1.3.4-12.ia64", "4AS:krb5-workstation-0:1.3.4-12.ppc", "4AS:krb5-workstation-0:1.3.4-12.s390", "4AS:krb5-workstation-0:1.3.4-12.s390x", "4AS:krb5-workstation-0:1.3.4-12.x86_64", "4Desktop:krb5-0:1.3.4-12.src", "4Desktop:krb5-debuginfo-0:1.3.4-12.i386", "4Desktop:krb5-debuginfo-0:1.3.4-12.ia64", "4Desktop:krb5-debuginfo-0:1.3.4-12.ppc", "4Desktop:krb5-debuginfo-0:1.3.4-12.ppc64", "4Desktop:krb5-debuginfo-0:1.3.4-12.s390", "4Desktop:krb5-debuginfo-0:1.3.4-12.s390x", "4Desktop:krb5-debuginfo-0:1.3.4-12.x86_64", "4Desktop:krb5-devel-0:1.3.4-12.i386", "4Desktop:krb5-devel-0:1.3.4-12.ia64", "4Desktop:krb5-devel-0:1.3.4-12.ppc", "4Desktop:krb5-devel-0:1.3.4-12.s390", "4Desktop:krb5-devel-0:1.3.4-12.s390x", "4Desktop:krb5-devel-0:1.3.4-12.x86_64", "4Desktop:krb5-libs-0:1.3.4-12.i386", "4Desktop:krb5-libs-0:1.3.4-12.ia64", "4Desktop:krb5-libs-0:1.3.4-12.ppc", "4Desktop:krb5-libs-0:1.3.4-12.ppc64", "4Desktop:krb5-libs-0:1.3.4-12.s390", "4Desktop:krb5-libs-0:1.3.4-12.s390x", "4Desktop:krb5-libs-0:1.3.4-12.x86_64", "4Desktop:krb5-server-0:1.3.4-12.i386", "4Desktop:krb5-server-0:1.3.4-12.ia64", "4Desktop:krb5-server-0:1.3.4-12.ppc", "4Desktop:krb5-server-0:1.3.4-12.s390", "4Desktop:krb5-server-0:1.3.4-12.s390x", "4Desktop:krb5-server-0:1.3.4-12.x86_64", "4Desktop:krb5-workstation-0:1.3.4-12.i386", "4Desktop:krb5-workstation-0:1.3.4-12.ia64", "4Desktop:krb5-workstation-0:1.3.4-12.ppc", "4Desktop:krb5-workstation-0:1.3.4-12.s390", "4Desktop:krb5-workstation-0:1.3.4-12.s390x", "4Desktop:krb5-workstation-0:1.3.4-12.x86_64", "4ES:krb5-0:1.3.4-12.src", "4ES:krb5-debuginfo-0:1.3.4-12.i386", "4ES:krb5-debuginfo-0:1.3.4-12.ia64", "4ES:krb5-debuginfo-0:1.3.4-12.ppc", "4ES:krb5-debuginfo-0:1.3.4-12.ppc64", "4ES:krb5-debuginfo-0:1.3.4-12.s390", "4ES:krb5-debuginfo-0:1.3.4-12.s390x", "4ES:krb5-debuginfo-0:1.3.4-12.x86_64", "4ES:krb5-devel-0:1.3.4-12.i386", "4ES:krb5-devel-0:1.3.4-12.ia64", "4ES:krb5-devel-0:1.3.4-12.ppc", "4ES:krb5-devel-0:1.3.4-12.s390", "4ES:krb5-devel-0:1.3.4-12.s390x", "4ES:krb5-devel-0:1.3.4-12.x86_64", "4ES:krb5-libs-0:1.3.4-12.i386", "4ES:krb5-libs-0:1.3.4-12.ia64", "4ES:krb5-libs-0:1.3.4-12.ppc", "4ES:krb5-libs-0:1.3.4-12.ppc64", "4ES:krb5-libs-0:1.3.4-12.s390", "4ES:krb5-libs-0:1.3.4-12.s390x", "4ES:krb5-libs-0:1.3.4-12.x86_64", "4ES:krb5-server-0:1.3.4-12.i386", "4ES:krb5-server-0:1.3.4-12.ia64", "4ES:krb5-server-0:1.3.4-12.ppc", "4ES:krb5-server-0:1.3.4-12.s390", "4ES:krb5-server-0:1.3.4-12.s390x", "4ES:krb5-server-0:1.3.4-12.x86_64", "4ES:krb5-workstation-0:1.3.4-12.i386", "4ES:krb5-workstation-0:1.3.4-12.ia64", "4ES:krb5-workstation-0:1.3.4-12.ppc", "4ES:krb5-workstation-0:1.3.4-12.s390", "4ES:krb5-workstation-0:1.3.4-12.s390x", "4ES:krb5-workstation-0:1.3.4-12.x86_64", "4WS:krb5-0:1.3.4-12.src", "4WS:krb5-debuginfo-0:1.3.4-12.i386", "4WS:krb5-debuginfo-0:1.3.4-12.ia64", "4WS:krb5-debuginfo-0:1.3.4-12.ppc", "4WS:krb5-debuginfo-0:1.3.4-12.ppc64", "4WS:krb5-debuginfo-0:1.3.4-12.s390", "4WS:krb5-debuginfo-0:1.3.4-12.s390x", "4WS:krb5-debuginfo-0:1.3.4-12.x86_64", "4WS:krb5-devel-0:1.3.4-12.i386", "4WS:krb5-devel-0:1.3.4-12.ia64", "4WS:krb5-devel-0:1.3.4-12.ppc", "4WS:krb5-devel-0:1.3.4-12.s390", "4WS:krb5-devel-0:1.3.4-12.s390x", "4WS:krb5-devel-0:1.3.4-12.x86_64", "4WS:krb5-libs-0:1.3.4-12.i386", "4WS:krb5-libs-0:1.3.4-12.ia64", "4WS:krb5-libs-0:1.3.4-12.ppc", "4WS:krb5-libs-0:1.3.4-12.ppc64", "4WS:krb5-libs-0:1.3.4-12.s390", "4WS:krb5-libs-0:1.3.4-12.s390x", "4WS:krb5-libs-0:1.3.4-12.x86_64", "4WS:krb5-server-0:1.3.4-12.i386", "4WS:krb5-server-0:1.3.4-12.ia64", "4WS:krb5-server-0:1.3.4-12.ppc", "4WS:krb5-server-0:1.3.4-12.s390", "4WS:krb5-server-0:1.3.4-12.s390x", "4WS:krb5-server-0:1.3.4-12.x86_64", "4WS:krb5-workstation-0:1.3.4-12.i386", "4WS:krb5-workstation-0:1.3.4-12.ia64", "4WS:krb5-workstation-0:1.3.4-12.ppc", "4WS:krb5-workstation-0:1.3.4-12.s390", "4WS:krb5-workstation-0:1.3.4-12.s390x", "4WS:krb5-workstation-0:1.3.4-12.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0468" }, { "category": "external", "summary": "RHBZ#1617527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617527" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0468", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0468" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0468", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0468" } ], "release_date": "2005-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-03-30T07:58:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:krb5-0:1.2.7-42.src", "3AS:krb5-debuginfo-0:1.2.7-42.i386", "3AS:krb5-debuginfo-0:1.2.7-42.ia64", "3AS:krb5-debuginfo-0:1.2.7-42.ppc", "3AS:krb5-debuginfo-0:1.2.7-42.ppc64", "3AS:krb5-debuginfo-0:1.2.7-42.s390", "3AS:krb5-debuginfo-0:1.2.7-42.s390x", "3AS:krb5-debuginfo-0:1.2.7-42.x86_64", "3AS:krb5-devel-0:1.2.7-42.i386", "3AS:krb5-devel-0:1.2.7-42.ia64", "3AS:krb5-devel-0:1.2.7-42.ppc", "3AS:krb5-devel-0:1.2.7-42.s390", "3AS:krb5-devel-0:1.2.7-42.s390x", "3AS:krb5-devel-0:1.2.7-42.x86_64", "3AS:krb5-libs-0:1.2.7-42.i386", "3AS:krb5-libs-0:1.2.7-42.ia64", "3AS:krb5-libs-0:1.2.7-42.ppc", "3AS:krb5-libs-0:1.2.7-42.ppc64", "3AS:krb5-libs-0:1.2.7-42.s390", "3AS:krb5-libs-0:1.2.7-42.s390x", "3AS:krb5-libs-0:1.2.7-42.x86_64", "3AS:krb5-server-0:1.2.7-42.i386", "3AS:krb5-server-0:1.2.7-42.ia64", "3AS:krb5-server-0:1.2.7-42.ppc", "3AS:krb5-server-0:1.2.7-42.s390", "3AS:krb5-server-0:1.2.7-42.s390x", "3AS:krb5-server-0:1.2.7-42.x86_64", "3AS:krb5-workstation-0:1.2.7-42.i386", "3AS:krb5-workstation-0:1.2.7-42.ia64", "3AS:krb5-workstation-0:1.2.7-42.ppc", "3AS:krb5-workstation-0:1.2.7-42.s390", "3AS:krb5-workstation-0:1.2.7-42.s390x", "3AS:krb5-workstation-0:1.2.7-42.x86_64", "3Desktop:krb5-0:1.2.7-42.src", "3Desktop:krb5-debuginfo-0:1.2.7-42.i386", "3Desktop:krb5-debuginfo-0:1.2.7-42.ia64", "3Desktop:krb5-debuginfo-0:1.2.7-42.ppc", "3Desktop:krb5-debuginfo-0:1.2.7-42.ppc64", "3Desktop:krb5-debuginfo-0:1.2.7-42.s390", "3Desktop:krb5-debuginfo-0:1.2.7-42.s390x", "3Desktop:krb5-debuginfo-0:1.2.7-42.x86_64", "3Desktop:krb5-devel-0:1.2.7-42.i386", "3Desktop:krb5-devel-0:1.2.7-42.ia64", "3Desktop:krb5-devel-0:1.2.7-42.ppc", "3Desktop:krb5-devel-0:1.2.7-42.s390", "3Desktop:krb5-devel-0:1.2.7-42.s390x", "3Desktop:krb5-devel-0:1.2.7-42.x86_64", "3Desktop:krb5-libs-0:1.2.7-42.i386", "3Desktop:krb5-libs-0:1.2.7-42.ia64", "3Desktop:krb5-libs-0:1.2.7-42.ppc", "3Desktop:krb5-libs-0:1.2.7-42.ppc64", "3Desktop:krb5-libs-0:1.2.7-42.s390", "3Desktop:krb5-libs-0:1.2.7-42.s390x", "3Desktop:krb5-libs-0:1.2.7-42.x86_64", "3Desktop:krb5-server-0:1.2.7-42.i386", "3Desktop:krb5-server-0:1.2.7-42.ia64", "3Desktop:krb5-server-0:1.2.7-42.ppc", "3Desktop:krb5-server-0:1.2.7-42.s390", "3Desktop:krb5-server-0:1.2.7-42.s390x", "3Desktop:krb5-server-0:1.2.7-42.x86_64", "3Desktop:krb5-workstation-0:1.2.7-42.i386", "3Desktop:krb5-workstation-0:1.2.7-42.ia64", "3Desktop:krb5-workstation-0:1.2.7-42.ppc", "3Desktop:krb5-workstation-0:1.2.7-42.s390", "3Desktop:krb5-workstation-0:1.2.7-42.s390x", "3Desktop:krb5-workstation-0:1.2.7-42.x86_64", "3ES:krb5-0:1.2.7-42.src", "3ES:krb5-debuginfo-0:1.2.7-42.i386", "3ES:krb5-debuginfo-0:1.2.7-42.ia64", "3ES:krb5-debuginfo-0:1.2.7-42.ppc", "3ES:krb5-debuginfo-0:1.2.7-42.ppc64", "3ES:krb5-debuginfo-0:1.2.7-42.s390", "3ES:krb5-debuginfo-0:1.2.7-42.s390x", "3ES:krb5-debuginfo-0:1.2.7-42.x86_64", "3ES:krb5-devel-0:1.2.7-42.i386", "3ES:krb5-devel-0:1.2.7-42.ia64", "3ES:krb5-devel-0:1.2.7-42.ppc", "3ES:krb5-devel-0:1.2.7-42.s390", "3ES:krb5-devel-0:1.2.7-42.s390x", "3ES:krb5-devel-0:1.2.7-42.x86_64", "3ES:krb5-libs-0:1.2.7-42.i386", "3ES:krb5-libs-0:1.2.7-42.ia64", "3ES:krb5-libs-0:1.2.7-42.ppc", "3ES:krb5-libs-0:1.2.7-42.ppc64", "3ES:krb5-libs-0:1.2.7-42.s390", "3ES:krb5-libs-0:1.2.7-42.s390x", "3ES:krb5-libs-0:1.2.7-42.x86_64", "3ES:krb5-server-0:1.2.7-42.i386", "3ES:krb5-server-0:1.2.7-42.ia64", "3ES:krb5-server-0:1.2.7-42.ppc", "3ES:krb5-server-0:1.2.7-42.s390", "3ES:krb5-server-0:1.2.7-42.s390x", "3ES:krb5-server-0:1.2.7-42.x86_64", "3ES:krb5-workstation-0:1.2.7-42.i386", "3ES:krb5-workstation-0:1.2.7-42.ia64", "3ES:krb5-workstation-0:1.2.7-42.ppc", "3ES:krb5-workstation-0:1.2.7-42.s390", "3ES:krb5-workstation-0:1.2.7-42.s390x", "3ES:krb5-workstation-0:1.2.7-42.x86_64", "3WS:krb5-0:1.2.7-42.src", "3WS:krb5-debuginfo-0:1.2.7-42.i386", "3WS:krb5-debuginfo-0:1.2.7-42.ia64", "3WS:krb5-debuginfo-0:1.2.7-42.ppc", "3WS:krb5-debuginfo-0:1.2.7-42.ppc64", "3WS:krb5-debuginfo-0:1.2.7-42.s390", "3WS:krb5-debuginfo-0:1.2.7-42.s390x", "3WS:krb5-debuginfo-0:1.2.7-42.x86_64", "3WS:krb5-devel-0:1.2.7-42.i386", "3WS:krb5-devel-0:1.2.7-42.ia64", "3WS:krb5-devel-0:1.2.7-42.ppc", "3WS:krb5-devel-0:1.2.7-42.s390", "3WS:krb5-devel-0:1.2.7-42.s390x", "3WS:krb5-devel-0:1.2.7-42.x86_64", "3WS:krb5-libs-0:1.2.7-42.i386", "3WS:krb5-libs-0:1.2.7-42.ia64", "3WS:krb5-libs-0:1.2.7-42.ppc", "3WS:krb5-libs-0:1.2.7-42.ppc64", "3WS:krb5-libs-0:1.2.7-42.s390", "3WS:krb5-libs-0:1.2.7-42.s390x", "3WS:krb5-libs-0:1.2.7-42.x86_64", "3WS:krb5-server-0:1.2.7-42.i386", "3WS:krb5-server-0:1.2.7-42.ia64", "3WS:krb5-server-0:1.2.7-42.ppc", "3WS:krb5-server-0:1.2.7-42.s390", "3WS:krb5-server-0:1.2.7-42.s390x", "3WS:krb5-server-0:1.2.7-42.x86_64", "3WS:krb5-workstation-0:1.2.7-42.i386", "3WS:krb5-workstation-0:1.2.7-42.ia64", "3WS:krb5-workstation-0:1.2.7-42.ppc", "3WS:krb5-workstation-0:1.2.7-42.s390", "3WS:krb5-workstation-0:1.2.7-42.s390x", "3WS:krb5-workstation-0:1.2.7-42.x86_64", "4AS:krb5-0:1.3.4-12.src", "4AS:krb5-debuginfo-0:1.3.4-12.i386", "4AS:krb5-debuginfo-0:1.3.4-12.ia64", "4AS:krb5-debuginfo-0:1.3.4-12.ppc", "4AS:krb5-debuginfo-0:1.3.4-12.ppc64", "4AS:krb5-debuginfo-0:1.3.4-12.s390", "4AS:krb5-debuginfo-0:1.3.4-12.s390x", "4AS:krb5-debuginfo-0:1.3.4-12.x86_64", "4AS:krb5-devel-0:1.3.4-12.i386", "4AS:krb5-devel-0:1.3.4-12.ia64", "4AS:krb5-devel-0:1.3.4-12.ppc", "4AS:krb5-devel-0:1.3.4-12.s390", "4AS:krb5-devel-0:1.3.4-12.s390x", "4AS:krb5-devel-0:1.3.4-12.x86_64", "4AS:krb5-libs-0:1.3.4-12.i386", "4AS:krb5-libs-0:1.3.4-12.ia64", "4AS:krb5-libs-0:1.3.4-12.ppc", "4AS:krb5-libs-0:1.3.4-12.ppc64", "4AS:krb5-libs-0:1.3.4-12.s390", "4AS:krb5-libs-0:1.3.4-12.s390x", "4AS:krb5-libs-0:1.3.4-12.x86_64", "4AS:krb5-server-0:1.3.4-12.i386", "4AS:krb5-server-0:1.3.4-12.ia64", "4AS:krb5-server-0:1.3.4-12.ppc", "4AS:krb5-server-0:1.3.4-12.s390", "4AS:krb5-server-0:1.3.4-12.s390x", "4AS:krb5-server-0:1.3.4-12.x86_64", "4AS:krb5-workstation-0:1.3.4-12.i386", "4AS:krb5-workstation-0:1.3.4-12.ia64", "4AS:krb5-workstation-0:1.3.4-12.ppc", "4AS:krb5-workstation-0:1.3.4-12.s390", "4AS:krb5-workstation-0:1.3.4-12.s390x", "4AS:krb5-workstation-0:1.3.4-12.x86_64", "4Desktop:krb5-0:1.3.4-12.src", "4Desktop:krb5-debuginfo-0:1.3.4-12.i386", "4Desktop:krb5-debuginfo-0:1.3.4-12.ia64", "4Desktop:krb5-debuginfo-0:1.3.4-12.ppc", "4Desktop:krb5-debuginfo-0:1.3.4-12.ppc64", "4Desktop:krb5-debuginfo-0:1.3.4-12.s390", "4Desktop:krb5-debuginfo-0:1.3.4-12.s390x", "4Desktop:krb5-debuginfo-0:1.3.4-12.x86_64", "4Desktop:krb5-devel-0:1.3.4-12.i386", "4Desktop:krb5-devel-0:1.3.4-12.ia64", "4Desktop:krb5-devel-0:1.3.4-12.ppc", "4Desktop:krb5-devel-0:1.3.4-12.s390", "4Desktop:krb5-devel-0:1.3.4-12.s390x", "4Desktop:krb5-devel-0:1.3.4-12.x86_64", "4Desktop:krb5-libs-0:1.3.4-12.i386", "4Desktop:krb5-libs-0:1.3.4-12.ia64", "4Desktop:krb5-libs-0:1.3.4-12.ppc", "4Desktop:krb5-libs-0:1.3.4-12.ppc64", "4Desktop:krb5-libs-0:1.3.4-12.s390", "4Desktop:krb5-libs-0:1.3.4-12.s390x", "4Desktop:krb5-libs-0:1.3.4-12.x86_64", "4Desktop:krb5-server-0:1.3.4-12.i386", "4Desktop:krb5-server-0:1.3.4-12.ia64", "4Desktop:krb5-server-0:1.3.4-12.ppc", "4Desktop:krb5-server-0:1.3.4-12.s390", "4Desktop:krb5-server-0:1.3.4-12.s390x", "4Desktop:krb5-server-0:1.3.4-12.x86_64", "4Desktop:krb5-workstation-0:1.3.4-12.i386", "4Desktop:krb5-workstation-0:1.3.4-12.ia64", "4Desktop:krb5-workstation-0:1.3.4-12.ppc", "4Desktop:krb5-workstation-0:1.3.4-12.s390", "4Desktop:krb5-workstation-0:1.3.4-12.s390x", "4Desktop:krb5-workstation-0:1.3.4-12.x86_64", "4ES:krb5-0:1.3.4-12.src", "4ES:krb5-debuginfo-0:1.3.4-12.i386", "4ES:krb5-debuginfo-0:1.3.4-12.ia64", "4ES:krb5-debuginfo-0:1.3.4-12.ppc", "4ES:krb5-debuginfo-0:1.3.4-12.ppc64", "4ES:krb5-debuginfo-0:1.3.4-12.s390", "4ES:krb5-debuginfo-0:1.3.4-12.s390x", "4ES:krb5-debuginfo-0:1.3.4-12.x86_64", "4ES:krb5-devel-0:1.3.4-12.i386", "4ES:krb5-devel-0:1.3.4-12.ia64", "4ES:krb5-devel-0:1.3.4-12.ppc", "4ES:krb5-devel-0:1.3.4-12.s390", "4ES:krb5-devel-0:1.3.4-12.s390x", "4ES:krb5-devel-0:1.3.4-12.x86_64", "4ES:krb5-libs-0:1.3.4-12.i386", "4ES:krb5-libs-0:1.3.4-12.ia64", "4ES:krb5-libs-0:1.3.4-12.ppc", "4ES:krb5-libs-0:1.3.4-12.ppc64", "4ES:krb5-libs-0:1.3.4-12.s390", "4ES:krb5-libs-0:1.3.4-12.s390x", "4ES:krb5-libs-0:1.3.4-12.x86_64", "4ES:krb5-server-0:1.3.4-12.i386", "4ES:krb5-server-0:1.3.4-12.ia64", "4ES:krb5-server-0:1.3.4-12.ppc", "4ES:krb5-server-0:1.3.4-12.s390", "4ES:krb5-server-0:1.3.4-12.s390x", "4ES:krb5-server-0:1.3.4-12.x86_64", "4ES:krb5-workstation-0:1.3.4-12.i386", "4ES:krb5-workstation-0:1.3.4-12.ia64", "4ES:krb5-workstation-0:1.3.4-12.ppc", "4ES:krb5-workstation-0:1.3.4-12.s390", "4ES:krb5-workstation-0:1.3.4-12.s390x", "4ES:krb5-workstation-0:1.3.4-12.x86_64", "4WS:krb5-0:1.3.4-12.src", "4WS:krb5-debuginfo-0:1.3.4-12.i386", "4WS:krb5-debuginfo-0:1.3.4-12.ia64", "4WS:krb5-debuginfo-0:1.3.4-12.ppc", "4WS:krb5-debuginfo-0:1.3.4-12.ppc64", "4WS:krb5-debuginfo-0:1.3.4-12.s390", "4WS:krb5-debuginfo-0:1.3.4-12.s390x", "4WS:krb5-debuginfo-0:1.3.4-12.x86_64", "4WS:krb5-devel-0:1.3.4-12.i386", "4WS:krb5-devel-0:1.3.4-12.ia64", "4WS:krb5-devel-0:1.3.4-12.ppc", "4WS:krb5-devel-0:1.3.4-12.s390", "4WS:krb5-devel-0:1.3.4-12.s390x", "4WS:krb5-devel-0:1.3.4-12.x86_64", "4WS:krb5-libs-0:1.3.4-12.i386", "4WS:krb5-libs-0:1.3.4-12.ia64", "4WS:krb5-libs-0:1.3.4-12.ppc", "4WS:krb5-libs-0:1.3.4-12.ppc64", "4WS:krb5-libs-0:1.3.4-12.s390", "4WS:krb5-libs-0:1.3.4-12.s390x", "4WS:krb5-libs-0:1.3.4-12.x86_64", "4WS:krb5-server-0:1.3.4-12.i386", "4WS:krb5-server-0:1.3.4-12.ia64", "4WS:krb5-server-0:1.3.4-12.ppc", "4WS:krb5-server-0:1.3.4-12.s390", "4WS:krb5-server-0:1.3.4-12.s390x", "4WS:krb5-server-0:1.3.4-12.x86_64", "4WS:krb5-workstation-0:1.3.4-12.i386", "4WS:krb5-workstation-0:1.3.4-12.ia64", "4WS:krb5-workstation-0:1.3.4-12.ppc", "4WS:krb5-workstation-0:1.3.4-12.s390", "4WS:krb5-workstation-0:1.3.4-12.s390x", "4WS:krb5-workstation-0:1.3.4-12.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:330" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "acknowledgments": [ { "names": [ "iDefense" ] } ], "cve": "CVE-2005-0469", "discovery_date": "2005-02-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617528" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", "title": "Statement" } ], "product_status": { "fixed": [ "3AS:krb5-0:1.2.7-42.src", "3AS:krb5-debuginfo-0:1.2.7-42.i386", "3AS:krb5-debuginfo-0:1.2.7-42.ia64", "3AS:krb5-debuginfo-0:1.2.7-42.ppc", "3AS:krb5-debuginfo-0:1.2.7-42.ppc64", "3AS:krb5-debuginfo-0:1.2.7-42.s390", "3AS:krb5-debuginfo-0:1.2.7-42.s390x", "3AS:krb5-debuginfo-0:1.2.7-42.x86_64", "3AS:krb5-devel-0:1.2.7-42.i386", "3AS:krb5-devel-0:1.2.7-42.ia64", "3AS:krb5-devel-0:1.2.7-42.ppc", "3AS:krb5-devel-0:1.2.7-42.s390", "3AS:krb5-devel-0:1.2.7-42.s390x", "3AS:krb5-devel-0:1.2.7-42.x86_64", "3AS:krb5-libs-0:1.2.7-42.i386", "3AS:krb5-libs-0:1.2.7-42.ia64", "3AS:krb5-libs-0:1.2.7-42.ppc", "3AS:krb5-libs-0:1.2.7-42.ppc64", "3AS:krb5-libs-0:1.2.7-42.s390", "3AS:krb5-libs-0:1.2.7-42.s390x", "3AS:krb5-libs-0:1.2.7-42.x86_64", "3AS:krb5-server-0:1.2.7-42.i386", "3AS:krb5-server-0:1.2.7-42.ia64", "3AS:krb5-server-0:1.2.7-42.ppc", "3AS:krb5-server-0:1.2.7-42.s390", "3AS:krb5-server-0:1.2.7-42.s390x", "3AS:krb5-server-0:1.2.7-42.x86_64", "3AS:krb5-workstation-0:1.2.7-42.i386", "3AS:krb5-workstation-0:1.2.7-42.ia64", "3AS:krb5-workstation-0:1.2.7-42.ppc", "3AS:krb5-workstation-0:1.2.7-42.s390", "3AS:krb5-workstation-0:1.2.7-42.s390x", "3AS:krb5-workstation-0:1.2.7-42.x86_64", "3Desktop:krb5-0:1.2.7-42.src", "3Desktop:krb5-debuginfo-0:1.2.7-42.i386", "3Desktop:krb5-debuginfo-0:1.2.7-42.ia64", "3Desktop:krb5-debuginfo-0:1.2.7-42.ppc", "3Desktop:krb5-debuginfo-0:1.2.7-42.ppc64", "3Desktop:krb5-debuginfo-0:1.2.7-42.s390", "3Desktop:krb5-debuginfo-0:1.2.7-42.s390x", "3Desktop:krb5-debuginfo-0:1.2.7-42.x86_64", "3Desktop:krb5-devel-0:1.2.7-42.i386", "3Desktop:krb5-devel-0:1.2.7-42.ia64", "3Desktop:krb5-devel-0:1.2.7-42.ppc", "3Desktop:krb5-devel-0:1.2.7-42.s390", "3Desktop:krb5-devel-0:1.2.7-42.s390x", "3Desktop:krb5-devel-0:1.2.7-42.x86_64", "3Desktop:krb5-libs-0:1.2.7-42.i386", "3Desktop:krb5-libs-0:1.2.7-42.ia64", "3Desktop:krb5-libs-0:1.2.7-42.ppc", "3Desktop:krb5-libs-0:1.2.7-42.ppc64", "3Desktop:krb5-libs-0:1.2.7-42.s390", "3Desktop:krb5-libs-0:1.2.7-42.s390x", "3Desktop:krb5-libs-0:1.2.7-42.x86_64", "3Desktop:krb5-server-0:1.2.7-42.i386", "3Desktop:krb5-server-0:1.2.7-42.ia64", "3Desktop:krb5-server-0:1.2.7-42.ppc", "3Desktop:krb5-server-0:1.2.7-42.s390", "3Desktop:krb5-server-0:1.2.7-42.s390x", "3Desktop:krb5-server-0:1.2.7-42.x86_64", "3Desktop:krb5-workstation-0:1.2.7-42.i386", "3Desktop:krb5-workstation-0:1.2.7-42.ia64", "3Desktop:krb5-workstation-0:1.2.7-42.ppc", "3Desktop:krb5-workstation-0:1.2.7-42.s390", "3Desktop:krb5-workstation-0:1.2.7-42.s390x", "3Desktop:krb5-workstation-0:1.2.7-42.x86_64", "3ES:krb5-0:1.2.7-42.src", "3ES:krb5-debuginfo-0:1.2.7-42.i386", "3ES:krb5-debuginfo-0:1.2.7-42.ia64", "3ES:krb5-debuginfo-0:1.2.7-42.ppc", "3ES:krb5-debuginfo-0:1.2.7-42.ppc64", "3ES:krb5-debuginfo-0:1.2.7-42.s390", "3ES:krb5-debuginfo-0:1.2.7-42.s390x", "3ES:krb5-debuginfo-0:1.2.7-42.x86_64", "3ES:krb5-devel-0:1.2.7-42.i386", "3ES:krb5-devel-0:1.2.7-42.ia64", "3ES:krb5-devel-0:1.2.7-42.ppc", "3ES:krb5-devel-0:1.2.7-42.s390", "3ES:krb5-devel-0:1.2.7-42.s390x", "3ES:krb5-devel-0:1.2.7-42.x86_64", "3ES:krb5-libs-0:1.2.7-42.i386", "3ES:krb5-libs-0:1.2.7-42.ia64", "3ES:krb5-libs-0:1.2.7-42.ppc", "3ES:krb5-libs-0:1.2.7-42.ppc64", "3ES:krb5-libs-0:1.2.7-42.s390", "3ES:krb5-libs-0:1.2.7-42.s390x", "3ES:krb5-libs-0:1.2.7-42.x86_64", "3ES:krb5-server-0:1.2.7-42.i386", "3ES:krb5-server-0:1.2.7-42.ia64", "3ES:krb5-server-0:1.2.7-42.ppc", "3ES:krb5-server-0:1.2.7-42.s390", "3ES:krb5-server-0:1.2.7-42.s390x", "3ES:krb5-server-0:1.2.7-42.x86_64", "3ES:krb5-workstation-0:1.2.7-42.i386", "3ES:krb5-workstation-0:1.2.7-42.ia64", "3ES:krb5-workstation-0:1.2.7-42.ppc", "3ES:krb5-workstation-0:1.2.7-42.s390", "3ES:krb5-workstation-0:1.2.7-42.s390x", "3ES:krb5-workstation-0:1.2.7-42.x86_64", "3WS:krb5-0:1.2.7-42.src", "3WS:krb5-debuginfo-0:1.2.7-42.i386", "3WS:krb5-debuginfo-0:1.2.7-42.ia64", "3WS:krb5-debuginfo-0:1.2.7-42.ppc", "3WS:krb5-debuginfo-0:1.2.7-42.ppc64", "3WS:krb5-debuginfo-0:1.2.7-42.s390", "3WS:krb5-debuginfo-0:1.2.7-42.s390x", "3WS:krb5-debuginfo-0:1.2.7-42.x86_64", "3WS:krb5-devel-0:1.2.7-42.i386", "3WS:krb5-devel-0:1.2.7-42.ia64", "3WS:krb5-devel-0:1.2.7-42.ppc", "3WS:krb5-devel-0:1.2.7-42.s390", "3WS:krb5-devel-0:1.2.7-42.s390x", "3WS:krb5-devel-0:1.2.7-42.x86_64", "3WS:krb5-libs-0:1.2.7-42.i386", "3WS:krb5-libs-0:1.2.7-42.ia64", "3WS:krb5-libs-0:1.2.7-42.ppc", "3WS:krb5-libs-0:1.2.7-42.ppc64", "3WS:krb5-libs-0:1.2.7-42.s390", "3WS:krb5-libs-0:1.2.7-42.s390x", "3WS:krb5-libs-0:1.2.7-42.x86_64", "3WS:krb5-server-0:1.2.7-42.i386", "3WS:krb5-server-0:1.2.7-42.ia64", "3WS:krb5-server-0:1.2.7-42.ppc", "3WS:krb5-server-0:1.2.7-42.s390", "3WS:krb5-server-0:1.2.7-42.s390x", "3WS:krb5-server-0:1.2.7-42.x86_64", "3WS:krb5-workstation-0:1.2.7-42.i386", "3WS:krb5-workstation-0:1.2.7-42.ia64", "3WS:krb5-workstation-0:1.2.7-42.ppc", "3WS:krb5-workstation-0:1.2.7-42.s390", "3WS:krb5-workstation-0:1.2.7-42.s390x", "3WS:krb5-workstation-0:1.2.7-42.x86_64", "4AS:krb5-0:1.3.4-12.src", "4AS:krb5-debuginfo-0:1.3.4-12.i386", "4AS:krb5-debuginfo-0:1.3.4-12.ia64", "4AS:krb5-debuginfo-0:1.3.4-12.ppc", "4AS:krb5-debuginfo-0:1.3.4-12.ppc64", "4AS:krb5-debuginfo-0:1.3.4-12.s390", "4AS:krb5-debuginfo-0:1.3.4-12.s390x", "4AS:krb5-debuginfo-0:1.3.4-12.x86_64", "4AS:krb5-devel-0:1.3.4-12.i386", "4AS:krb5-devel-0:1.3.4-12.ia64", "4AS:krb5-devel-0:1.3.4-12.ppc", "4AS:krb5-devel-0:1.3.4-12.s390", "4AS:krb5-devel-0:1.3.4-12.s390x", "4AS:krb5-devel-0:1.3.4-12.x86_64", "4AS:krb5-libs-0:1.3.4-12.i386", "4AS:krb5-libs-0:1.3.4-12.ia64", "4AS:krb5-libs-0:1.3.4-12.ppc", "4AS:krb5-libs-0:1.3.4-12.ppc64", "4AS:krb5-libs-0:1.3.4-12.s390", "4AS:krb5-libs-0:1.3.4-12.s390x", "4AS:krb5-libs-0:1.3.4-12.x86_64", "4AS:krb5-server-0:1.3.4-12.i386", "4AS:krb5-server-0:1.3.4-12.ia64", "4AS:krb5-server-0:1.3.4-12.ppc", "4AS:krb5-server-0:1.3.4-12.s390", "4AS:krb5-server-0:1.3.4-12.s390x", "4AS:krb5-server-0:1.3.4-12.x86_64", "4AS:krb5-workstation-0:1.3.4-12.i386", "4AS:krb5-workstation-0:1.3.4-12.ia64", "4AS:krb5-workstation-0:1.3.4-12.ppc", "4AS:krb5-workstation-0:1.3.4-12.s390", "4AS:krb5-workstation-0:1.3.4-12.s390x", "4AS:krb5-workstation-0:1.3.4-12.x86_64", "4Desktop:krb5-0:1.3.4-12.src", "4Desktop:krb5-debuginfo-0:1.3.4-12.i386", "4Desktop:krb5-debuginfo-0:1.3.4-12.ia64", "4Desktop:krb5-debuginfo-0:1.3.4-12.ppc", "4Desktop:krb5-debuginfo-0:1.3.4-12.ppc64", "4Desktop:krb5-debuginfo-0:1.3.4-12.s390", "4Desktop:krb5-debuginfo-0:1.3.4-12.s390x", "4Desktop:krb5-debuginfo-0:1.3.4-12.x86_64", "4Desktop:krb5-devel-0:1.3.4-12.i386", "4Desktop:krb5-devel-0:1.3.4-12.ia64", "4Desktop:krb5-devel-0:1.3.4-12.ppc", "4Desktop:krb5-devel-0:1.3.4-12.s390", "4Desktop:krb5-devel-0:1.3.4-12.s390x", "4Desktop:krb5-devel-0:1.3.4-12.x86_64", "4Desktop:krb5-libs-0:1.3.4-12.i386", "4Desktop:krb5-libs-0:1.3.4-12.ia64", "4Desktop:krb5-libs-0:1.3.4-12.ppc", "4Desktop:krb5-libs-0:1.3.4-12.ppc64", "4Desktop:krb5-libs-0:1.3.4-12.s390", "4Desktop:krb5-libs-0:1.3.4-12.s390x", "4Desktop:krb5-libs-0:1.3.4-12.x86_64", "4Desktop:krb5-server-0:1.3.4-12.i386", "4Desktop:krb5-server-0:1.3.4-12.ia64", "4Desktop:krb5-server-0:1.3.4-12.ppc", "4Desktop:krb5-server-0:1.3.4-12.s390", "4Desktop:krb5-server-0:1.3.4-12.s390x", "4Desktop:krb5-server-0:1.3.4-12.x86_64", "4Desktop:krb5-workstation-0:1.3.4-12.i386", "4Desktop:krb5-workstation-0:1.3.4-12.ia64", "4Desktop:krb5-workstation-0:1.3.4-12.ppc", "4Desktop:krb5-workstation-0:1.3.4-12.s390", "4Desktop:krb5-workstation-0:1.3.4-12.s390x", "4Desktop:krb5-workstation-0:1.3.4-12.x86_64", "4ES:krb5-0:1.3.4-12.src", "4ES:krb5-debuginfo-0:1.3.4-12.i386", "4ES:krb5-debuginfo-0:1.3.4-12.ia64", "4ES:krb5-debuginfo-0:1.3.4-12.ppc", "4ES:krb5-debuginfo-0:1.3.4-12.ppc64", "4ES:krb5-debuginfo-0:1.3.4-12.s390", "4ES:krb5-debuginfo-0:1.3.4-12.s390x", "4ES:krb5-debuginfo-0:1.3.4-12.x86_64", "4ES:krb5-devel-0:1.3.4-12.i386", "4ES:krb5-devel-0:1.3.4-12.ia64", "4ES:krb5-devel-0:1.3.4-12.ppc", "4ES:krb5-devel-0:1.3.4-12.s390", "4ES:krb5-devel-0:1.3.4-12.s390x", "4ES:krb5-devel-0:1.3.4-12.x86_64", "4ES:krb5-libs-0:1.3.4-12.i386", "4ES:krb5-libs-0:1.3.4-12.ia64", "4ES:krb5-libs-0:1.3.4-12.ppc", "4ES:krb5-libs-0:1.3.4-12.ppc64", "4ES:krb5-libs-0:1.3.4-12.s390", "4ES:krb5-libs-0:1.3.4-12.s390x", "4ES:krb5-libs-0:1.3.4-12.x86_64", "4ES:krb5-server-0:1.3.4-12.i386", "4ES:krb5-server-0:1.3.4-12.ia64", "4ES:krb5-server-0:1.3.4-12.ppc", "4ES:krb5-server-0:1.3.4-12.s390", "4ES:krb5-server-0:1.3.4-12.s390x", "4ES:krb5-server-0:1.3.4-12.x86_64", "4ES:krb5-workstation-0:1.3.4-12.i386", "4ES:krb5-workstation-0:1.3.4-12.ia64", "4ES:krb5-workstation-0:1.3.4-12.ppc", "4ES:krb5-workstation-0:1.3.4-12.s390", "4ES:krb5-workstation-0:1.3.4-12.s390x", "4ES:krb5-workstation-0:1.3.4-12.x86_64", "4WS:krb5-0:1.3.4-12.src", "4WS:krb5-debuginfo-0:1.3.4-12.i386", "4WS:krb5-debuginfo-0:1.3.4-12.ia64", "4WS:krb5-debuginfo-0:1.3.4-12.ppc", "4WS:krb5-debuginfo-0:1.3.4-12.ppc64", "4WS:krb5-debuginfo-0:1.3.4-12.s390", "4WS:krb5-debuginfo-0:1.3.4-12.s390x", "4WS:krb5-debuginfo-0:1.3.4-12.x86_64", "4WS:krb5-devel-0:1.3.4-12.i386", "4WS:krb5-devel-0:1.3.4-12.ia64", "4WS:krb5-devel-0:1.3.4-12.ppc", "4WS:krb5-devel-0:1.3.4-12.s390", "4WS:krb5-devel-0:1.3.4-12.s390x", "4WS:krb5-devel-0:1.3.4-12.x86_64", "4WS:krb5-libs-0:1.3.4-12.i386", "4WS:krb5-libs-0:1.3.4-12.ia64", "4WS:krb5-libs-0:1.3.4-12.ppc", "4WS:krb5-libs-0:1.3.4-12.ppc64", "4WS:krb5-libs-0:1.3.4-12.s390", "4WS:krb5-libs-0:1.3.4-12.s390x", "4WS:krb5-libs-0:1.3.4-12.x86_64", "4WS:krb5-server-0:1.3.4-12.i386", "4WS:krb5-server-0:1.3.4-12.ia64", "4WS:krb5-server-0:1.3.4-12.ppc", "4WS:krb5-server-0:1.3.4-12.s390", "4WS:krb5-server-0:1.3.4-12.s390x", "4WS:krb5-server-0:1.3.4-12.x86_64", "4WS:krb5-workstation-0:1.3.4-12.i386", "4WS:krb5-workstation-0:1.3.4-12.ia64", "4WS:krb5-workstation-0:1.3.4-12.ppc", "4WS:krb5-workstation-0:1.3.4-12.s390", "4WS:krb5-workstation-0:1.3.4-12.s390x", "4WS:krb5-workstation-0:1.3.4-12.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0469" }, { "category": "external", "summary": "RHBZ#1617528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0469", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0469" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0469", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0469" } ], "release_date": "2005-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-03-30T07:58:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:krb5-0:1.2.7-42.src", "3AS:krb5-debuginfo-0:1.2.7-42.i386", "3AS:krb5-debuginfo-0:1.2.7-42.ia64", "3AS:krb5-debuginfo-0:1.2.7-42.ppc", "3AS:krb5-debuginfo-0:1.2.7-42.ppc64", "3AS:krb5-debuginfo-0:1.2.7-42.s390", "3AS:krb5-debuginfo-0:1.2.7-42.s390x", "3AS:krb5-debuginfo-0:1.2.7-42.x86_64", "3AS:krb5-devel-0:1.2.7-42.i386", "3AS:krb5-devel-0:1.2.7-42.ia64", "3AS:krb5-devel-0:1.2.7-42.ppc", "3AS:krb5-devel-0:1.2.7-42.s390", "3AS:krb5-devel-0:1.2.7-42.s390x", "3AS:krb5-devel-0:1.2.7-42.x86_64", "3AS:krb5-libs-0:1.2.7-42.i386", "3AS:krb5-libs-0:1.2.7-42.ia64", "3AS:krb5-libs-0:1.2.7-42.ppc", "3AS:krb5-libs-0:1.2.7-42.ppc64", "3AS:krb5-libs-0:1.2.7-42.s390", "3AS:krb5-libs-0:1.2.7-42.s390x", "3AS:krb5-libs-0:1.2.7-42.x86_64", "3AS:krb5-server-0:1.2.7-42.i386", "3AS:krb5-server-0:1.2.7-42.ia64", "3AS:krb5-server-0:1.2.7-42.ppc", "3AS:krb5-server-0:1.2.7-42.s390", "3AS:krb5-server-0:1.2.7-42.s390x", "3AS:krb5-server-0:1.2.7-42.x86_64", "3AS:krb5-workstation-0:1.2.7-42.i386", "3AS:krb5-workstation-0:1.2.7-42.ia64", "3AS:krb5-workstation-0:1.2.7-42.ppc", "3AS:krb5-workstation-0:1.2.7-42.s390", "3AS:krb5-workstation-0:1.2.7-42.s390x", "3AS:krb5-workstation-0:1.2.7-42.x86_64", "3Desktop:krb5-0:1.2.7-42.src", "3Desktop:krb5-debuginfo-0:1.2.7-42.i386", "3Desktop:krb5-debuginfo-0:1.2.7-42.ia64", "3Desktop:krb5-debuginfo-0:1.2.7-42.ppc", "3Desktop:krb5-debuginfo-0:1.2.7-42.ppc64", "3Desktop:krb5-debuginfo-0:1.2.7-42.s390", "3Desktop:krb5-debuginfo-0:1.2.7-42.s390x", "3Desktop:krb5-debuginfo-0:1.2.7-42.x86_64", "3Desktop:krb5-devel-0:1.2.7-42.i386", "3Desktop:krb5-devel-0:1.2.7-42.ia64", "3Desktop:krb5-devel-0:1.2.7-42.ppc", "3Desktop:krb5-devel-0:1.2.7-42.s390", "3Desktop:krb5-devel-0:1.2.7-42.s390x", "3Desktop:krb5-devel-0:1.2.7-42.x86_64", "3Desktop:krb5-libs-0:1.2.7-42.i386", "3Desktop:krb5-libs-0:1.2.7-42.ia64", "3Desktop:krb5-libs-0:1.2.7-42.ppc", "3Desktop:krb5-libs-0:1.2.7-42.ppc64", "3Desktop:krb5-libs-0:1.2.7-42.s390", "3Desktop:krb5-libs-0:1.2.7-42.s390x", "3Desktop:krb5-libs-0:1.2.7-42.x86_64", "3Desktop:krb5-server-0:1.2.7-42.i386", "3Desktop:krb5-server-0:1.2.7-42.ia64", "3Desktop:krb5-server-0:1.2.7-42.ppc", "3Desktop:krb5-server-0:1.2.7-42.s390", "3Desktop:krb5-server-0:1.2.7-42.s390x", "3Desktop:krb5-server-0:1.2.7-42.x86_64", "3Desktop:krb5-workstation-0:1.2.7-42.i386", "3Desktop:krb5-workstation-0:1.2.7-42.ia64", "3Desktop:krb5-workstation-0:1.2.7-42.ppc", "3Desktop:krb5-workstation-0:1.2.7-42.s390", "3Desktop:krb5-workstation-0:1.2.7-42.s390x", "3Desktop:krb5-workstation-0:1.2.7-42.x86_64", "3ES:krb5-0:1.2.7-42.src", "3ES:krb5-debuginfo-0:1.2.7-42.i386", "3ES:krb5-debuginfo-0:1.2.7-42.ia64", "3ES:krb5-debuginfo-0:1.2.7-42.ppc", "3ES:krb5-debuginfo-0:1.2.7-42.ppc64", "3ES:krb5-debuginfo-0:1.2.7-42.s390", "3ES:krb5-debuginfo-0:1.2.7-42.s390x", "3ES:krb5-debuginfo-0:1.2.7-42.x86_64", "3ES:krb5-devel-0:1.2.7-42.i386", "3ES:krb5-devel-0:1.2.7-42.ia64", "3ES:krb5-devel-0:1.2.7-42.ppc", "3ES:krb5-devel-0:1.2.7-42.s390", "3ES:krb5-devel-0:1.2.7-42.s390x", "3ES:krb5-devel-0:1.2.7-42.x86_64", "3ES:krb5-libs-0:1.2.7-42.i386", "3ES:krb5-libs-0:1.2.7-42.ia64", "3ES:krb5-libs-0:1.2.7-42.ppc", "3ES:krb5-libs-0:1.2.7-42.ppc64", "3ES:krb5-libs-0:1.2.7-42.s390", "3ES:krb5-libs-0:1.2.7-42.s390x", "3ES:krb5-libs-0:1.2.7-42.x86_64", "3ES:krb5-server-0:1.2.7-42.i386", "3ES:krb5-server-0:1.2.7-42.ia64", "3ES:krb5-server-0:1.2.7-42.ppc", "3ES:krb5-server-0:1.2.7-42.s390", "3ES:krb5-server-0:1.2.7-42.s390x", "3ES:krb5-server-0:1.2.7-42.x86_64", "3ES:krb5-workstation-0:1.2.7-42.i386", "3ES:krb5-workstation-0:1.2.7-42.ia64", "3ES:krb5-workstation-0:1.2.7-42.ppc", "3ES:krb5-workstation-0:1.2.7-42.s390", "3ES:krb5-workstation-0:1.2.7-42.s390x", "3ES:krb5-workstation-0:1.2.7-42.x86_64", "3WS:krb5-0:1.2.7-42.src", "3WS:krb5-debuginfo-0:1.2.7-42.i386", "3WS:krb5-debuginfo-0:1.2.7-42.ia64", "3WS:krb5-debuginfo-0:1.2.7-42.ppc", "3WS:krb5-debuginfo-0:1.2.7-42.ppc64", "3WS:krb5-debuginfo-0:1.2.7-42.s390", "3WS:krb5-debuginfo-0:1.2.7-42.s390x", "3WS:krb5-debuginfo-0:1.2.7-42.x86_64", "3WS:krb5-devel-0:1.2.7-42.i386", "3WS:krb5-devel-0:1.2.7-42.ia64", "3WS:krb5-devel-0:1.2.7-42.ppc", "3WS:krb5-devel-0:1.2.7-42.s390", "3WS:krb5-devel-0:1.2.7-42.s390x", "3WS:krb5-devel-0:1.2.7-42.x86_64", "3WS:krb5-libs-0:1.2.7-42.i386", "3WS:krb5-libs-0:1.2.7-42.ia64", "3WS:krb5-libs-0:1.2.7-42.ppc", "3WS:krb5-libs-0:1.2.7-42.ppc64", "3WS:krb5-libs-0:1.2.7-42.s390", "3WS:krb5-libs-0:1.2.7-42.s390x", "3WS:krb5-libs-0:1.2.7-42.x86_64", "3WS:krb5-server-0:1.2.7-42.i386", "3WS:krb5-server-0:1.2.7-42.ia64", "3WS:krb5-server-0:1.2.7-42.ppc", "3WS:krb5-server-0:1.2.7-42.s390", "3WS:krb5-server-0:1.2.7-42.s390x", "3WS:krb5-server-0:1.2.7-42.x86_64", "3WS:krb5-workstation-0:1.2.7-42.i386", "3WS:krb5-workstation-0:1.2.7-42.ia64", "3WS:krb5-workstation-0:1.2.7-42.ppc", "3WS:krb5-workstation-0:1.2.7-42.s390", "3WS:krb5-workstation-0:1.2.7-42.s390x", "3WS:krb5-workstation-0:1.2.7-42.x86_64", "4AS:krb5-0:1.3.4-12.src", "4AS:krb5-debuginfo-0:1.3.4-12.i386", "4AS:krb5-debuginfo-0:1.3.4-12.ia64", "4AS:krb5-debuginfo-0:1.3.4-12.ppc", "4AS:krb5-debuginfo-0:1.3.4-12.ppc64", "4AS:krb5-debuginfo-0:1.3.4-12.s390", "4AS:krb5-debuginfo-0:1.3.4-12.s390x", "4AS:krb5-debuginfo-0:1.3.4-12.x86_64", "4AS:krb5-devel-0:1.3.4-12.i386", "4AS:krb5-devel-0:1.3.4-12.ia64", "4AS:krb5-devel-0:1.3.4-12.ppc", "4AS:krb5-devel-0:1.3.4-12.s390", "4AS:krb5-devel-0:1.3.4-12.s390x", "4AS:krb5-devel-0:1.3.4-12.x86_64", "4AS:krb5-libs-0:1.3.4-12.i386", "4AS:krb5-libs-0:1.3.4-12.ia64", "4AS:krb5-libs-0:1.3.4-12.ppc", "4AS:krb5-libs-0:1.3.4-12.ppc64", "4AS:krb5-libs-0:1.3.4-12.s390", "4AS:krb5-libs-0:1.3.4-12.s390x", "4AS:krb5-libs-0:1.3.4-12.x86_64", "4AS:krb5-server-0:1.3.4-12.i386", "4AS:krb5-server-0:1.3.4-12.ia64", "4AS:krb5-server-0:1.3.4-12.ppc", "4AS:krb5-server-0:1.3.4-12.s390", "4AS:krb5-server-0:1.3.4-12.s390x", "4AS:krb5-server-0:1.3.4-12.x86_64", "4AS:krb5-workstation-0:1.3.4-12.i386", "4AS:krb5-workstation-0:1.3.4-12.ia64", "4AS:krb5-workstation-0:1.3.4-12.ppc", "4AS:krb5-workstation-0:1.3.4-12.s390", "4AS:krb5-workstation-0:1.3.4-12.s390x", "4AS:krb5-workstation-0:1.3.4-12.x86_64", "4Desktop:krb5-0:1.3.4-12.src", "4Desktop:krb5-debuginfo-0:1.3.4-12.i386", "4Desktop:krb5-debuginfo-0:1.3.4-12.ia64", "4Desktop:krb5-debuginfo-0:1.3.4-12.ppc", "4Desktop:krb5-debuginfo-0:1.3.4-12.ppc64", "4Desktop:krb5-debuginfo-0:1.3.4-12.s390", "4Desktop:krb5-debuginfo-0:1.3.4-12.s390x", "4Desktop:krb5-debuginfo-0:1.3.4-12.x86_64", "4Desktop:krb5-devel-0:1.3.4-12.i386", "4Desktop:krb5-devel-0:1.3.4-12.ia64", "4Desktop:krb5-devel-0:1.3.4-12.ppc", "4Desktop:krb5-devel-0:1.3.4-12.s390", "4Desktop:krb5-devel-0:1.3.4-12.s390x", "4Desktop:krb5-devel-0:1.3.4-12.x86_64", "4Desktop:krb5-libs-0:1.3.4-12.i386", "4Desktop:krb5-libs-0:1.3.4-12.ia64", "4Desktop:krb5-libs-0:1.3.4-12.ppc", "4Desktop:krb5-libs-0:1.3.4-12.ppc64", "4Desktop:krb5-libs-0:1.3.4-12.s390", "4Desktop:krb5-libs-0:1.3.4-12.s390x", "4Desktop:krb5-libs-0:1.3.4-12.x86_64", "4Desktop:krb5-server-0:1.3.4-12.i386", "4Desktop:krb5-server-0:1.3.4-12.ia64", "4Desktop:krb5-server-0:1.3.4-12.ppc", "4Desktop:krb5-server-0:1.3.4-12.s390", "4Desktop:krb5-server-0:1.3.4-12.s390x", "4Desktop:krb5-server-0:1.3.4-12.x86_64", "4Desktop:krb5-workstation-0:1.3.4-12.i386", "4Desktop:krb5-workstation-0:1.3.4-12.ia64", "4Desktop:krb5-workstation-0:1.3.4-12.ppc", "4Desktop:krb5-workstation-0:1.3.4-12.s390", "4Desktop:krb5-workstation-0:1.3.4-12.s390x", "4Desktop:krb5-workstation-0:1.3.4-12.x86_64", "4ES:krb5-0:1.3.4-12.src", "4ES:krb5-debuginfo-0:1.3.4-12.i386", "4ES:krb5-debuginfo-0:1.3.4-12.ia64", "4ES:krb5-debuginfo-0:1.3.4-12.ppc", "4ES:krb5-debuginfo-0:1.3.4-12.ppc64", "4ES:krb5-debuginfo-0:1.3.4-12.s390", "4ES:krb5-debuginfo-0:1.3.4-12.s390x", "4ES:krb5-debuginfo-0:1.3.4-12.x86_64", "4ES:krb5-devel-0:1.3.4-12.i386", "4ES:krb5-devel-0:1.3.4-12.ia64", "4ES:krb5-devel-0:1.3.4-12.ppc", "4ES:krb5-devel-0:1.3.4-12.s390", "4ES:krb5-devel-0:1.3.4-12.s390x", "4ES:krb5-devel-0:1.3.4-12.x86_64", "4ES:krb5-libs-0:1.3.4-12.i386", "4ES:krb5-libs-0:1.3.4-12.ia64", "4ES:krb5-libs-0:1.3.4-12.ppc", "4ES:krb5-libs-0:1.3.4-12.ppc64", "4ES:krb5-libs-0:1.3.4-12.s390", "4ES:krb5-libs-0:1.3.4-12.s390x", "4ES:krb5-libs-0:1.3.4-12.x86_64", "4ES:krb5-server-0:1.3.4-12.i386", "4ES:krb5-server-0:1.3.4-12.ia64", "4ES:krb5-server-0:1.3.4-12.ppc", "4ES:krb5-server-0:1.3.4-12.s390", "4ES:krb5-server-0:1.3.4-12.s390x", "4ES:krb5-server-0:1.3.4-12.x86_64", "4ES:krb5-workstation-0:1.3.4-12.i386", "4ES:krb5-workstation-0:1.3.4-12.ia64", "4ES:krb5-workstation-0:1.3.4-12.ppc", "4ES:krb5-workstation-0:1.3.4-12.s390", "4ES:krb5-workstation-0:1.3.4-12.s390x", "4ES:krb5-workstation-0:1.3.4-12.x86_64", "4WS:krb5-0:1.3.4-12.src", "4WS:krb5-debuginfo-0:1.3.4-12.i386", "4WS:krb5-debuginfo-0:1.3.4-12.ia64", "4WS:krb5-debuginfo-0:1.3.4-12.ppc", "4WS:krb5-debuginfo-0:1.3.4-12.ppc64", "4WS:krb5-debuginfo-0:1.3.4-12.s390", "4WS:krb5-debuginfo-0:1.3.4-12.s390x", "4WS:krb5-debuginfo-0:1.3.4-12.x86_64", "4WS:krb5-devel-0:1.3.4-12.i386", "4WS:krb5-devel-0:1.3.4-12.ia64", "4WS:krb5-devel-0:1.3.4-12.ppc", "4WS:krb5-devel-0:1.3.4-12.s390", "4WS:krb5-devel-0:1.3.4-12.s390x", "4WS:krb5-devel-0:1.3.4-12.x86_64", "4WS:krb5-libs-0:1.3.4-12.i386", "4WS:krb5-libs-0:1.3.4-12.ia64", "4WS:krb5-libs-0:1.3.4-12.ppc", "4WS:krb5-libs-0:1.3.4-12.ppc64", "4WS:krb5-libs-0:1.3.4-12.s390", "4WS:krb5-libs-0:1.3.4-12.s390x", "4WS:krb5-libs-0:1.3.4-12.x86_64", "4WS:krb5-server-0:1.3.4-12.i386", "4WS:krb5-server-0:1.3.4-12.ia64", "4WS:krb5-server-0:1.3.4-12.ppc", "4WS:krb5-server-0:1.3.4-12.s390", "4WS:krb5-server-0:1.3.4-12.s390x", "4WS:krb5-server-0:1.3.4-12.x86_64", "4WS:krb5-workstation-0:1.3.4-12.i386", "4WS:krb5-workstation-0:1.3.4-12.ia64", "4WS:krb5-workstation-0:1.3.4-12.ppc", "4WS:krb5-workstation-0:1.3.4-12.s390", "4WS:krb5-workstation-0:1.3.4-12.s390x", "4WS:krb5-workstation-0:1.3.4-12.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:330" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
ghsa-5hfw-w8jp-h4hj
Vulnerability from github
Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.
{ "affected": [], "aliases": [ "CVE-2005-0469" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-05-02T04:00:00Z", "severity": "HIGH" }, "details": "Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.", "id": "GHSA-5hfw-w8jp-h4hj", "modified": "2022-05-03T03:14:03Z", "published": "2022-05-03T03:14:03Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0469" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708" }, { "type": "WEB", "url": "http://secunia.com/advisories/14745" }, { "type": "WEB", "url": "http://secunia.com/advisories/17899" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1" }, { "type": "WEB", "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt" }, { "type": "WEB", "url": "http://www.debian.de/security/2005/dsa-731" }, { "type": "WEB", "url": "http://www.debian.org/security/2005/dsa-697" }, { "type": "WEB", "url": "http://www.debian.org/security/2005/dsa-699" }, { "type": "WEB", "url": "http://www.debian.org/security/2005/dsa-703" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml" }, { "type": "WEB", "url": "http://www.idefense.com/application/poi/display?id=220\u0026type=vulnerabilities" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/291924" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:061" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-327.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-330.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/12918" }, { "type": "WEB", "url": "http://www.ubuntulinux.org/usn/usn-224-1" } ], "schema_version": "1.4.0", "severity": [] }
var-200505-0163
Vulnerability from variot
Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands. Multiple Telnet clients contain a data length validation flaw which may allow a server to induce arbitrary code execution on the client host. A remote buffer-overflow vulnerability affects multiple vendors' Telnet client. This issue is due to the application's failure to properly validate the length of user-supplied strings before copying them into static process buffers. An attacker may exploit this issue to execute arbitrary code with the privileges of the user that activated the vulnerable application. This may facilitate unauthorized access or privilege escalation.
Want a new IT Security job?
Vacant positions at Secunia: http://secunia.com/secunia_vacancies/
TITLE: Sun SEAM Telnet Client Buffer Overflow Vulnerabilities
SECUNIA ADVISORY ID: SA15030
VERIFY ADVISORY: http://secunia.com/advisories/15030/
CRITICAL: Moderately critical
IMPACT: System access
WHERE:
From remote
SOFTWARE: Sun SEAM 1.x http://secunia.com/product/1006/
DESCRIPTION: Sun has acknowledged some vulnerabilities in SEAM, which can be exploited by malicious people to compromise a vulnerable system.
For more information: SA14745
SOLUTION: The vendor suggests removing the execute permissions from "/usr/krb5/bin/telnet".
ORIGINAL ADVISORY: Sun Microsystems: http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1
OTHER REFERENCES: SA14745: http://secunia.com/advisories/14745/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. Heimdal, a free implementation of Kerberos 5, also contains such a client. This can lead to the execution of arbitrary code when connected to a malicious server.
For the old stable distribution (woody) this problem has been fixed in version 0.4e-7.woody.11.
For the stable distribution (sarge) this problem has been fixed in version 0.6.3-10.
For the unstable distribution (sid) this problem has been fixed in version 0.6.3-10.
We recommend that you upgrade your heimdal package.
Upgrade Instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/h/heimdal/heimdal_0.4e-7.woody.11.dsc
Size/MD5 checksum: 1065 8fc37ea432a8120da0f370b0b2c9125b
http://security.debian.org/pool/updates/main/h/heimdal/heimdal_0.4e-7.woody.11.diff.gz
Size/MD5 checksum: 1295043 b27c9a952ed6a53698d654b2dbca9b52
http://security.debian.org/pool/updates/main/h/heimdal/heimdal_0.4e.orig.tar.gz
Size/MD5 checksum: 2885718 1d27b06ec2f818f5b4ae2b90ca0e9cb8
Architecture independent components:
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-docs_0.4e-7.woody.11_all.deb
Size/MD5 checksum: 1056336 e6f819c78b38e6c9b854104879a82a76
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-lib_0.4e-7.woody.11_all.deb
Size/MD5 checksum: 20298 630b472eea6aef8b53ed678ebd6d9676
Alpha architecture:
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 275276 12437fc71585df2debc30260d44881ae
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients-x_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 61016 e28f3db25cf9fced15d07c9843d0bb7f
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-dev_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 573726 fcd82b8d22e86f0f67b188e5a182aad9
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-kdc_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 135164 67d1f00e15b893fbd7f1a0009eb9047c
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 181834 7860ca01ee394b8200487356546fe94e
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers-x_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 39864 f631f57c94a0554e3daa62b6f3029999
http://security.debian.org/pool/updates/main/h/heimdal/libasn1-5-heimdal_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 65534 6b3fa215d70b35e71ec21545d3db48db
http://security.debian.org/pool/updates/main/h/heimdal/libcomerr1-heimdal_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 23892 fc3c8e707764634638083acb5b4b6312
http://security.debian.org/pool/updates/main/h/heimdal/libgssapi1-heimdal_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 43368 269a6e04b6e7db823a237b7af6812eb3
http://security.debian.org/pool/updates/main/h/heimdal/libhdb7-heimdal_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 41880 0e9ca330caa8ae710f8594d156065e0c
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5clnt4-heimdal_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 33922 2d774846eed21710c9c9cf19e9af2cf8
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5srv7-heimdal_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 44744 d154ba1ed49d1458ee2707d021d1e8b8
http://security.debian.org/pool/updates/main/h/heimdal/libkafs0-heimdal_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 31484 d22c13f1da35553ba942274dec958959
http://security.debian.org/pool/updates/main/h/heimdal/libkrb5-17-heimdal_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 134054 3261ce8e03209f64748d4e05fcf47bc3
http://security.debian.org/pool/updates/main/h/heimdal/libotp0-heimdal_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 65944 5a5aeea7b73b37b3604d9d3d43991881
http://security.debian.org/pool/updates/main/h/heimdal/libroken9-heimdal_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 59356 80c67e5e8bba2ffeaad753a6dd5173be
http://security.debian.org/pool/updates/main/h/heimdal/libsl0-heimdal_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 28538 700352c1de8dd30a37f95da03d5ad9ce
http://security.debian.org/pool/updates/main/h/heimdal/libss0-heimdal_0.4e-7.woody.11_alpha.deb
Size/MD5 checksum: 29424 91458eb256f4d7b446f8d3899f751193
ARM architecture:
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 227174 8ab44db32ee205256ca597197eff9427
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients-x_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 53968 ca664151450031013a9bfb0dd5fb32af
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-dev_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 441598 25127b23b893ba6515cbb9be7dee0ebd
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-kdc_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 110266 ec3cde13087c74757744ca9bfebe00d5
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 148006 ee02412bfd96d484a147e5e8c06f40ee
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers-x_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 35538 aa3e74b814fcdb1abb401f11eb8842e1
http://security.debian.org/pool/updates/main/h/heimdal/libasn1-5-heimdal_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 57216 4081aad0b651d131f3424980879bc861
http://security.debian.org/pool/updates/main/h/heimdal/libcomerr1-heimdal_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 23412 03b68670c37f4a4cc8fee59f4023e903
http://security.debian.org/pool/updates/main/h/heimdal/libgssapi1-heimdal_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 38594 7a3315d21fdf7c3854bba5e17bca1e11
http://security.debian.org/pool/updates/main/h/heimdal/libhdb7-heimdal_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 38298 0f16402f3694c2bb1d4cc4450df540e4
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5clnt4-heimdal_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 31850 3e1bd368481f666f6d7b2ec2dc4ed912
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5srv7-heimdal_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 40000 024228d74f0a589c73e31688cbb9f3e1
http://security.debian.org/pool/updates/main/h/heimdal/libkafs0-heimdal_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 29842 9e7ef427e9d3fd277ca8448d3078a2b6
http://security.debian.org/pool/updates/main/h/heimdal/libkrb5-17-heimdal_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 112472 3fc814c80adaaace125166bd8cd013d3
http://security.debian.org/pool/updates/main/h/heimdal/libotp0-heimdal_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 51960 b48f25ea15d3e65d6444ce5960213d32
http://security.debian.org/pool/updates/main/h/heimdal/libroken9-heimdal_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 53414 fdd7b63f63ffea2ef5e4574528419baf
http://security.debian.org/pool/updates/main/h/heimdal/libsl0-heimdal_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 28918 a15c818745634dee06c40610b66a92f6
http://security.debian.org/pool/updates/main/h/heimdal/libss0-heimdal_0.4e-7.woody.11_arm.deb
Size/MD5 checksum: 29636 e97a487116f2367299decb51cccc098f
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 219936 7cd4a7ae4c56f3a1a4700fea756b62c3
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients-x_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 52704 a64eea9e99a5dffeb211167f2edfac7b
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-dev_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 405344 d5d263dba7f36d95ac5344d750abd1f0
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-kdc_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 109934 37fab8f1c45a897a7a063641133789d5
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 144312 21570cc9e367ab0ccb89a011a56b2177
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers-x_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 35670 039764b15c3a1e18703cc1fa2773c97e
http://security.debian.org/pool/updates/main/h/heimdal/libasn1-5-heimdal_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 59842 4a1a98a52cbc2d86d4c5adf088bec1e3
http://security.debian.org/pool/updates/main/h/heimdal/libcomerr1-heimdal_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 23304 ad9ed998a1ae50e6dd5368c07ed5db7d
http://security.debian.org/pool/updates/main/h/heimdal/libgssapi1-heimdal_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 38682 5170e1500eba0b17baedc95e6e763063
http://security.debian.org/pool/updates/main/h/heimdal/libhdb7-heimdal_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 38612 425b8857ddb2105a6d2ec9399eeeef4e
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5clnt4-heimdal_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 32068 6cb760663c089906b9c8cc89c1395f34
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5srv7-heimdal_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 40062 9f9d04c843ae164bbdf28b7d1a4ede7f
http://security.debian.org/pool/updates/main/h/heimdal/libkafs0-heimdal_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 29712 a375688e6029d5fae6ae4e3662ed88b1
http://security.debian.org/pool/updates/main/h/heimdal/libkrb5-17-heimdal_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 111312 1ea1a0a7b36935fa1d3fbaf508530a94
http://security.debian.org/pool/updates/main/h/heimdal/libotp0-heimdal_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 51816 935711339e95322f578622bf3271c4fd
http://security.debian.org/pool/updates/main/h/heimdal/libroken9-heimdal_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 51696 223796e010ca4be9e927c438ffa921ac
http://security.debian.org/pool/updates/main/h/heimdal/libsl0-heimdal_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 27500 4b5382836ff3c4f1bdcff2a30e7a97ba
http://security.debian.org/pool/updates/main/h/heimdal/libss0-heimdal_0.4e-7.woody.11_i386.deb
Size/MD5 checksum: 28222 d4ea500c49786252fbb522d32fb78ee3
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 335082 762bb44529ac965fafe57a153375f8cf
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients-x_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 69096 cf9fd237439d89479af7e813447c7ad5
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-dev_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 613424 efacfc44d5d6bac9227bc6709e52182c
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-kdc_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 154164 ec762443001df7fe29a3a497ad9c14df
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 210540 d4e2c1c65f0a4f1bc1d20ca1348d3972
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers-x_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 44222 87a27ba41ffc9ad9d5296ba1133ec8cc
http://security.debian.org/pool/updates/main/h/heimdal/libasn1-5-heimdal_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 82102 a1cabba1e3ab285acc9d0ec414ea5d5c
http://security.debian.org/pool/updates/main/h/heimdal/libcomerr1-heimdal_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 24782 996c48ba78eabc7a24c92eea9abf70bc
http://security.debian.org/pool/updates/main/h/heimdal/libgssapi1-heimdal_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 50174 21abd59f30af1574012e6c75d7f7d7e5
http://security.debian.org/pool/updates/main/h/heimdal/libhdb7-heimdal_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 48600 b12ccb241bbe65a5acc1009cb41508d8
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5clnt4-heimdal_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 37744 d881400db00426478c525913366d5dcb
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5srv7-heimdal_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 52210 81a0014eee08020f7f333f2835d089b8
http://security.debian.org/pool/updates/main/h/heimdal/libkafs0-heimdal_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 35256 49820e0275c2f170d50531d0cf4be224
http://security.debian.org/pool/updates/main/h/heimdal/libkrb5-17-heimdal_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 169750 ae2c7d4ccd96a7c495a91bb8272bf872
http://security.debian.org/pool/updates/main/h/heimdal/libotp0-heimdal_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 64900 421ce6b03daf43a5ca9769d95c614a34
http://security.debian.org/pool/updates/main/h/heimdal/libroken9-heimdal_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 68682 a3b21eb50c8757538bc234e948a3e35a
http://security.debian.org/pool/updates/main/h/heimdal/libsl0-heimdal_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 30710 9eb38bbec69e72e52581cd355373ced3
http://security.debian.org/pool/updates/main/h/heimdal/libss0-heimdal_0.4e-7.woody.11_ia64.deb
Size/MD5 checksum: 31932 e2fbc77b172c6eb54c12461333f00ef1
HP Precision architecture:
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 256874 140bdfc671e9acd9150a6995b247af34
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients-x_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 57454 caa48211376a98c67e03d068e6fbeb6f
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-dev_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 516072 ae166665afe33ad8e24ae155e74e7bce
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-kdc_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 119300 8b7fae0ab762cb2522db9b78d8c0d186
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 162998 c4c23fcc53e97f070b5d528eb163af00
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers-x_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 37784 dbf2fb481981fe63a558447139c5b7bb
http://security.debian.org/pool/updates/main/h/heimdal/libasn1-5-heimdal_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 69388 fbd6ba202c666b7c8b27686fb309f528
http://security.debian.org/pool/updates/main/h/heimdal/libcomerr1-heimdal_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 23946 96ab72df3ae02e9822a52fa4d0fe08c2
http://security.debian.org/pool/updates/main/h/heimdal/libgssapi1-heimdal_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 42206 50ce55dbed833c43a58c7b5913249754
http://security.debian.org/pool/updates/main/h/heimdal/libhdb7-heimdal_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 43540 8b1c4044113c1021717ef3c5b79686d6
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5clnt4-heimdal_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 34384 ce7f69712e2af6ec72bbddaaa4a4ed9d
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5srv7-heimdal_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 45178 2148edf895d480b315fd5236a82af8be
http://security.debian.org/pool/updates/main/h/heimdal/libkafs0-heimdal_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 32060 966345ea7709602258fefcc66b75c2a3
http://security.debian.org/pool/updates/main/h/heimdal/libkrb5-17-heimdal_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 139936 a1917b6ae317b87749a7ea8b6c68cc96
http://security.debian.org/pool/updates/main/h/heimdal/libotp0-heimdal_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 70198 5350eedbce161c1c2cd09d780a80e8ae
http://security.debian.org/pool/updates/main/h/heimdal/libroken9-heimdal_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 60560 722387dd2747e994d49335669ea93449
http://security.debian.org/pool/updates/main/h/heimdal/libsl0-heimdal_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 30790 07abee4e10bd0f2834292aa9aed0351c
http://security.debian.org/pool/updates/main/h/heimdal/libss0-heimdal_0.4e-7.woody.11_hppa.deb
Size/MD5 checksum: 31656 a2601adf14c97c6339e5eece745b61ed
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 211826 b3a51143513404c3a58869ccdc980352
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients-x_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 52172 05037589546d7bad9cf0fdc47c9b234a
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-dev_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 399312 bdec29fdaa096cfb4205448ca30debdf
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-kdc_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 105690 104bd645147011b71b3d4250083df27d
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 138286 5f206db56db8e0c610eb17349f6da5be
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers-x_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 35156 c55f2924284487b4169a9d52f3b79f18
http://security.debian.org/pool/updates/main/h/heimdal/libasn1-5-heimdal_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 55500 b0b11055a2b744a20688eda87678f24c
http://security.debian.org/pool/updates/main/h/heimdal/libcomerr1-heimdal_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 23424 3e66bc4d54685e4cbafc1a53dcb7e4cf
http://security.debian.org/pool/updates/main/h/heimdal/libgssapi1-heimdal_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 38200 296ae362e7a9483e866f959ad4a5832b
http://security.debian.org/pool/updates/main/h/heimdal/libhdb7-heimdal_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 37984 aa745d6da276a877a415fd66a06128d8
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5clnt4-heimdal_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 31712 9af44dffde45b673760c7991606eb312
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5srv7-heimdal_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 39850 606e9fe193e34f3ae1ea864e3a9e21bd
http://security.debian.org/pool/updates/main/h/heimdal/libkafs0-heimdal_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 29436 ba92cf45fc7bfed068cc3de3d63220ee
http://security.debian.org/pool/updates/main/h/heimdal/libkrb5-17-heimdal_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 111036 ade91cc8a12d1d5a3e57e4762a68a060
http://security.debian.org/pool/updates/main/h/heimdal/libotp0-heimdal_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 68726 77f24b45977cb9e3e729ee64d4e3ec4b
http://security.debian.org/pool/updates/main/h/heimdal/libroken9-heimdal_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 49958 4967192c48b8ad8bc1f0c0b244635616
http://security.debian.org/pool/updates/main/h/heimdal/libsl0-heimdal_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 27460 883c720bb718cd60dbe9f38c8792c2e0
http://security.debian.org/pool/updates/main/h/heimdal/libss0-heimdal_0.4e-7.woody.11_m68k.deb
Size/MD5 checksum: 28192 88b86afb0a2b04da8785c165402d7727
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 248918 005efbd5408a65d580e0c4d8ed8ed80b
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients-x_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 55564 4aa128a89c3f5b8dd3529e89e3d27f37
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-dev_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 505212 d8dda2a0131d90cf29d9e299d28b356b
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-kdc_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 114882 5102fbf99e5f52569a22a2c17748a520
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 160242 cf112ed81fdf868ab6efb07ef93ac2d7
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers-x_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 37388 6a46e03e6fdbd7e4803ef2fb1370c699
http://security.debian.org/pool/updates/main/h/heimdal/libasn1-5-heimdal_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 58340 086cf69030b957bbe6cd27516f717f29
http://security.debian.org/pool/updates/main/h/heimdal/libcomerr1-heimdal_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 23590 15c7586e6b6cd94e3c3a559e980e5645
http://security.debian.org/pool/updates/main/h/heimdal/libgssapi1-heimdal_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 39534 755f9ee7cd757674e4d569ae01ec9474
http://security.debian.org/pool/updates/main/h/heimdal/libhdb7-heimdal_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 39014 7199130531d369f8c8bd8178ae66158f
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5clnt4-heimdal_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 32122 8d128559a4e7b55a8309c7ded954ea93
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5srv7-heimdal_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 40734 cd594016cfb45138345f8d19f824d5b2
http://security.debian.org/pool/updates/main/h/heimdal/libkafs0-heimdal_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 30376 946da152608b5d49ed90edb152946442
http://security.debian.org/pool/updates/main/h/heimdal/libkrb5-17-heimdal_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 120610 42e1d7253a98a12279a61bc3b12bfe10
http://security.debian.org/pool/updates/main/h/heimdal/libotp0-heimdal_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 57476 f4e2d9e86dc852068faad25bb8e78ca5
http://security.debian.org/pool/updates/main/h/heimdal/libroken9-heimdal_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 53346 974a501c32c765c9063ca0b1bf0100b3
http://security.debian.org/pool/updates/main/h/heimdal/libsl0-heimdal_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 28520 fa5ce3789529406ce6c62f6fb24e46b2
http://security.debian.org/pool/updates/main/h/heimdal/libss0-heimdal_0.4e-7.woody.11_mips.deb
Size/MD5 checksum: 29186 8736a50aa2789aaed507714ebd298240
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 248064 8891058ed6fc8826f4bd57d5b8eb26b1
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients-x_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 55550 559be15f2dc64fffea360f5281660435
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-dev_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 499388 8c838954ef0b75815fc8eedb3fc7559f
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-kdc_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 114840 5d87f1b1d7dddf6d4087730b810d3d5d
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 160350 cae061acf36faa4acc76abf8640051f8
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers-x_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 37308 b14e3b3f5c4ef1c9bb0615a9c2dace69
http://security.debian.org/pool/updates/main/h/heimdal/libasn1-5-heimdal_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 57946 acc5e0cee40880946eb211fb6d395f2c
http://security.debian.org/pool/updates/main/h/heimdal/libcomerr1-heimdal_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 23590 4b376e0c25d261f8eaa64e8a8bbd3d8c
http://security.debian.org/pool/updates/main/h/heimdal/libgssapi1-heimdal_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 39220 5c6c245272b4b80fadd56f2248f7861e
http://security.debian.org/pool/updates/main/h/heimdal/libhdb7-heimdal_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 38712 e57c37dc5afcb2d09d684b759ac33f77
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5clnt4-heimdal_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 32044 dc3622de31025834023b1c2e68ef3246
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5srv7-heimdal_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 40354 9ffa12ee944c9def479add6f18db7dc1
http://security.debian.org/pool/updates/main/h/heimdal/libkafs0-heimdal_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 30352 69ea54f0432371140f802ac1a2e6f1ff
http://security.debian.org/pool/updates/main/h/heimdal/libkrb5-17-heimdal_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 119520 307afbe2f26e9db953abb82c7d305799
http://security.debian.org/pool/updates/main/h/heimdal/libotp0-heimdal_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 52682 07759311f573f201c3187808f0955b54
http://security.debian.org/pool/updates/main/h/heimdal/libroken9-heimdal_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 53410 4033254bfa0482ec101e9de313ba5bfd
http://security.debian.org/pool/updates/main/h/heimdal/libsl0-heimdal_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 28588 71be890e75aa25f27cac29437ba3b4cb
http://security.debian.org/pool/updates/main/h/heimdal/libss0-heimdal_0.4e-7.woody.11_mipsel.deb
Size/MD5 checksum: 29268 8260428b6857d0b2bf127f47d8082f66
PowerPC architecture:
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 228262 a5c5faca2967096b1a364c13740d32df
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients-x_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 53894 552c568c50d62e54a5e96daa2bb87c1c
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-dev_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 466526 a50ed6bb5e236c8d6db8243734803ea0
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-kdc_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 110132 4c947ba0c94cef3629eaa0f7eac8c2a1
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 149254 722d7ced6894cefd14f68e446af458db
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers-x_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 36230 dfbe16f671521b1515c9c8c9265a5342
http://security.debian.org/pool/updates/main/h/heimdal/libasn1-5-heimdal_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 57226 cfea58fb03d07ed85d674df21f1c7e7e
http://security.debian.org/pool/updates/main/h/heimdal/libcomerr1-heimdal_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 23580 7d63a22a980a14030126cfa322243ffc
http://security.debian.org/pool/updates/main/h/heimdal/libgssapi1-heimdal_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 39364 f6e7d32e6da45f8d5893e1d681eb9788
http://security.debian.org/pool/updates/main/h/heimdal/libhdb7-heimdal_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 38630 1a815e315e9650a39f9c685fa8861846
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5clnt4-heimdal_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 31794 b54c265e1578e0f40cc7a683d6b8c742
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5srv7-heimdal_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 40104 7dd0775da038d1b34428efd6bffa4b6c
http://security.debian.org/pool/updates/main/h/heimdal/libkafs0-heimdal_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 30246 a7a5c8635a3c1c9b508e8af3dd05d44f
http://security.debian.org/pool/updates/main/h/heimdal/libkrb5-17-heimdal_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 118918 2f21bb221eef3fb8ab9caa3006dae794
http://security.debian.org/pool/updates/main/h/heimdal/libotp0-heimdal_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 69400 7d1bb7b9e83a7ed9cf53cb5d385e9447
http://security.debian.org/pool/updates/main/h/heimdal/libroken9-heimdal_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 53826 fe4212f691d675bf1f682d17329c6c5e
http://security.debian.org/pool/updates/main/h/heimdal/libsl0-heimdal_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 28744 0012158f14e5fff7ec9988e2d7939cf6
http://security.debian.org/pool/updates/main/h/heimdal/libss0-heimdal_0.4e-7.woody.11_powerpc.deb
Size/MD5 checksum: 29560 58921e138af421a9ea48d7a35b728f01
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 235020 45fae34704d01f03b5e0dd716bf91e90
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients-x_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 55710 9cd974e488c7bc3a8430d01fe5dd6ad0
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-dev_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 433342 d6affed884050cffe8776f79ed749897
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-kdc_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 116002 7d68b959b4d7897179273c0d795c4a21
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 153824 6de2ef670834b0b22cde0888637d81a6
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers-x_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 36982 fc870d47a3a23441cb83452904bed977
http://security.debian.org/pool/updates/main/h/heimdal/libasn1-5-heimdal_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 58358 ccf0873fd87a468e71c2d2745fcc0284
http://security.debian.org/pool/updates/main/h/heimdal/libcomerr1-heimdal_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 23664 6229dd41d0719f3a8b5fbafa81221584
http://security.debian.org/pool/updates/main/h/heimdal/libgssapi1-heimdal_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 41084 ed1f1756f66cfa655b04e77c02308fa3
http://security.debian.org/pool/updates/main/h/heimdal/libhdb7-heimdal_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 39846 edc6789b94dc803b6e59efb287151162
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5clnt4-heimdal_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 33028 f74bb90f54953af275deadb3a09beedc
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5srv7-heimdal_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 41900 81aa709bde50ea906d512637db5412df
http://security.debian.org/pool/updates/main/h/heimdal/libkafs0-heimdal_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 30394 4055618b16374db57fcbe27264e35f61
http://security.debian.org/pool/updates/main/h/heimdal/libkrb5-17-heimdal_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 125432 4e1b2fd68cdb66d210b5860870654a81
http://security.debian.org/pool/updates/main/h/heimdal/libotp0-heimdal_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 69554 606b376355b9392208cbba9cd43d6e0a
http://security.debian.org/pool/updates/main/h/heimdal/libroken9-heimdal_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 54608 a2f3303e3a1bb49e47ed0f68673509b2
http://security.debian.org/pool/updates/main/h/heimdal/libsl0-heimdal_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 28688 2df7664e3ff5a1173c62575184c674e8
http://security.debian.org/pool/updates/main/h/heimdal/libss0-heimdal_0.4e-7.woody.11_s390.deb
Size/MD5 checksum: 29510 6b28d5ca95a5e09b74989bc1f6f81c14
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 227226 513f1a6c24c6b815470078cc0e2ee72e
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients-x_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 54026 52d920d2cfcf8e208e3a04afc2983751
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-dev_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 430544 7819784bedbc84d394ca11ed42c2c9e4
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-kdc_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 107728 c694c5e1d66d5985aaf2bf4eda793ba0
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 151578 07eb106e95368b5dec91521907398d1d
http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers-x_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 35636 1eab2cc36c7adc947b5e2fa70800e9b8
http://security.debian.org/pool/updates/main/h/heimdal/libasn1-5-heimdal_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 54854 eb29480cce8645f5bb72f2f2694b2f26
http://security.debian.org/pool/updates/main/h/heimdal/libcomerr1-heimdal_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 26260 9ddcdbc49b997c4dc903a651e3007877
http://security.debian.org/pool/updates/main/h/heimdal/libgssapi1-heimdal_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 39100 cf636dca0a94f193f46bcf88db439672
http://security.debian.org/pool/updates/main/h/heimdal/libhdb7-heimdal_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 38004 28e82ffa12af5c90df707e686ef29906
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5clnt4-heimdal_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 31738 c70af19b2e2f73f1359208f0f8ce59b6
http://security.debian.org/pool/updates/main/h/heimdal/libkadm5srv7-heimdal_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 39884 cb269f527e83ae03a9b2db051a487fa8
http://security.debian.org/pool/updates/main/h/heimdal/libkafs0-heimdal_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 29702 925140a648da199ef7338bf415f605db
http://security.debian.org/pool/updates/main/h/heimdal/libkrb5-17-heimdal_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 112400 5c9329c597ca1448ed158e30b4f7895a
http://security.debian.org/pool/updates/main/h/heimdal/libotp0-heimdal_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 58340 473a1c45ba02d9c84bb786ee116a46bd
http://security.debian.org/pool/updates/main/h/heimdal/libroken9-heimdal_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 55444 0272fc78d38e0c1d3dd7176e412504e2
http://security.debian.org/pool/updates/main/h/heimdal/libsl0-heimdal_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 28256 a33d2dbf32502d3f3caf3917e82c5ffe
http://security.debian.org/pool/updates/main/h/heimdal/libss0-heimdal_0.4e-7.woody.11_sparc.deb
Size/MD5 checksum: 28954 28a7aed2ab84250549c5e64ac987e00c
These files will probably be moved into the stable distribution on its next update. BACKGROUND
The TELNET protocol allows virtual network terminals to be connected to over the internet. The initial description of the protocol was given in RFC854 in May 1983. Since then there have been many extra features added including encryption.
II.
The vulnerability specifically exists in the handling of the LINEMODE suboptions, in that there is no size check made on the output, which is stored in a fixed length buffer.
III. It may be possible to automatically launch the telnet command from a webpage, for example:
gsd-2005-0469
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2005-0469", "description": "Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.", "id": "GSD-2005-0469", "references": [ "https://www.suse.com/security/cve/CVE-2005-0469.html", "https://www.debian.org/security/2005/dsa-765", "https://www.debian.org/security/2005/dsa-731", "https://www.debian.org/security/2005/dsa-703", "https://www.debian.org/security/2005/dsa-697", "https://www.debian.org/security/2005/dsa-699", "https://access.redhat.com/errata/RHSA-2005:330", "https://access.redhat.com/errata/RHSA-2005:327" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2005-0469" ], "details": "Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.", "id": "GSD-2005-0469", "modified": "2023-12-13T01:20:08.295466Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0469", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-731", "refsource": "DEBIAN", "url": "http://www.debian.de/security/2005/dsa-731" }, { "name": "20050405-01-P", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P" }, { "name": "12918", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12918" }, { "name": "USN-224-1", "refsource": "UBUNTU", "url": "http://www.ubuntulinux.org/usn/usn-224-1" }, { "name": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt", "refsource": "CONFIRM", "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt" }, { "name": "57755", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1" }, { "name": "oval:org.mitre.oval:def:9708", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708" }, { "name": "DSA-703", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-703" }, { "name": "101665", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1" }, { "name": "DSA-699", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-699" }, { "name": "MDKSA-2005:061", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:061" }, { "name": "14745", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14745" }, { "name": "RHSA-2005:327", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-327.html" }, { "name": "20050328 Multiple Telnet Client slc_add_reply() Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://www.idefense.com/application/poi/display?id=220\u0026type=vulnerabilities" }, { "name": "FreeBSD-SA-05:01.telnet", "refsource": "FREEBSD", "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc" }, { "name": "GLSA-200503-36", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml" }, { "name": "RHSA-2005:330", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-330.html" }, { "name": "DSA-697", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-697" }, { "name": "57761", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1" }, { "name": "VU#291924", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/291924" }, { "name": "101671", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1" }, { "name": "17899", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17899" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ncsa:telnet:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0469" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "20050328 Multiple Telnet Client slc_add_reply() Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.idefense.com/application/poi/display?id=220\u0026type=vulnerabilities" }, { "name": "FreeBSD-SA-05:01.telnet", "refsource": "FREEBSD", "tags": [ "Vendor Advisory" ], "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.asc" }, { "name": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt" }, { "name": "DSA-697", "refsource": "DEBIAN", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2005/dsa-697" }, { "name": "DSA-699", "refsource": "DEBIAN", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2005/dsa-699" }, { "name": "DSA-703", "refsource": "DEBIAN", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2005/dsa-703" }, { "name": "GLSA-200503-36", "refsource": "GENTOO", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-36.xml" }, { "name": "RHSA-2005:327", "refsource": "REDHAT", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-327.html" }, { "name": "RHSA-2005:330", "refsource": "REDHAT", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-330.html" }, { "name": "20050405-01-P", "refsource": "SGI", "tags": [ "Patch" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20050405-01-P" }, { "name": "57755", "refsource": "SUNALERT", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1" }, { "name": "VU#291924", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/291924" }, { "name": "DSA-731", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.de/security/2005/dsa-731" }, { "name": "14745", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/14745" }, { "name": "57761", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1" }, { "name": "USN-224-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntulinux.org/usn/usn-224-1" }, { "name": "17899", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17899" }, { "name": "12918", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/12918" }, { "name": "101671", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1" }, { "name": "101665", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1" }, { "name": "MDKSA-2005:061", "refsource": "MANDRAKE", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:061" }, { "name": "oval:org.mitre.oval:def:9708", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9708" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2017-10-11T01:29Z", "publishedDate": "2005-05-02T04:00Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.