Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-4309
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:08:35.116Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "33631", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33631" }, { "name": "32664", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32664" }, { "name": "32560", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32560" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3549" }, { "name": "SUSE-SR:2009:003", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0001.html" }, { "name": "ADV-2009-0301", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0301" }, { "name": "33746", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33746" }, { "name": "RHSA-2008:0971", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0971.html" }, { "name": "35074", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35074" }, { "name": "35679", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35679" }, { "name": "oval:org.mitre.oval:def:9860", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860" }, { "name": "APPLE-SA-2009-05-12", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "33003", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33003" }, { "name": "262908", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1" }, { "name": "32539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32539" }, { "name": "32711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32711" }, { "name": "DSA-1663", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "oval:org.mitre.oval:def:6353", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353" }, { "name": "netsnmp-netsnmpcreatesubtreecache-dos(46262)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46262" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272" }, { "name": "[oss-security] 20081031 New net-snmp DoS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/10/31/1" }, { "name": "APPLE-SA-2010-12-16-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html" }, { "name": "TA09-133A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=882903" }, { "name": "oval:org.mitre.oval:def:6171", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171" }, { "name": "33095", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33095" }, { "name": "ADV-2009-1297", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "1021129", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021129" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4298" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm" }, { "name": "ADV-2008-2973", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2973" }, { "name": "32020", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32020" }, { "name": "33821", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33821" }, { "name": "ADV-2009-1771", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1771" }, { "name": "GLSA-200901-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200901-15.xml" }, { "name": "20081112 rPSA-2008-0315-1 net-snmp net-snmp-client net-snmp-server net-snmp-utils", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/498280/100/0/threaded" }, { "name": "HPSBMA02447", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "name": "USN-685-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "name": "SSRT090062", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "name": "ADV-2008-3400", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3400" }, { "name": "MDVSA-2008:225", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:225" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-10-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "33631", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33631" }, { "name": "32664", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32664" }, { "name": "32560", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32560" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3549" }, { "name": "SUSE-SR:2009:003", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0001.html" }, { "name": "ADV-2009-0301", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0301" }, { "name": "33746", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33746" }, { "name": "RHSA-2008:0971", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0971.html" }, { "name": "35074", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35074" }, { "name": "35679", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35679" }, { "name": "oval:org.mitre.oval:def:9860", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860" }, { "name": "APPLE-SA-2009-05-12", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "33003", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33003" }, { "name": "262908", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1" }, { "name": "32539", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32539" }, { "name": "32711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32711" }, { "name": "DSA-1663", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "oval:org.mitre.oval:def:6353", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353" }, { "name": "netsnmp-netsnmpcreatesubtreecache-dos(46262)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46262" }, { "tags": [ "x_refsource_MISC" ], "url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272" }, { "name": "[oss-security] 20081031 New net-snmp DoS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/10/31/1" }, { "name": "APPLE-SA-2010-12-16-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html" }, { "name": "TA09-133A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=882903" }, { "name": "oval:org.mitre.oval:def:6171", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171" }, { "name": "33095", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33095" }, { "name": "ADV-2009-1297", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "1021129", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021129" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4298" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm" }, { "name": "ADV-2008-2973", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2973" }, { "name": "32020", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32020" }, { "name": "33821", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33821" }, { "name": "ADV-2009-1771", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1771" }, { "name": "GLSA-200901-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200901-15.xml" }, { "name": "20081112 rPSA-2008-0315-1 net-snmp net-snmp-client net-snmp-server net-snmp-utils", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/498280/100/0/threaded" }, { "name": "HPSBMA02447", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "name": "USN-685-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "name": "SSRT090062", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "name": "ADV-2008-3400", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3400" }, { "name": "MDVSA-2008:225", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:225" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-4309", "datePublished": "2008-10-31T20:00:00", "dateReserved": "2008-09-29T00:00:00", "dateUpdated": "2024-08-07T10:08:35.116Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2008-4309\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2008-10-31T20:29:09.497\",\"lastModified\":\"2024-11-21T00:51:21.590\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.\"},{\"lang\":\"es\",\"value\":\"El c\u00f3digo getbulk en net-snmp 5.4 antes de v5.4.2.1, 5.3 antes de v5.3.2.3, y 5.2 antes de v5.2.5.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante vectores relacionados con el n\u00famero de respuestas o repeticiones.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:net-snmp:net-snmp:5.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F129CD3-B1ED-4FF4-8A86-2F76898E8915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:net-snmp:net-snmp:5.3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53505415-38BE-4EDC-824E-B64B5BF5B0D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:net-snmp:net-snmp:5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"950BC4AA-60A3-4512-A452-F205FF843C29\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32539\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32560\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32664\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/32711\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/33003\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/33095\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/33631\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/33746\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/33821\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/35074\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/35679\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200901-15.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sourceforge.net/forum/forum.php?forum_id=882903\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT3549\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT4298\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1663\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:225\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/10/31/1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0971.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/498280/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/32020\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1021129\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-685-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2973\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/3400\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0301\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1297\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1771\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/46262\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32539\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32560\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32664\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32711\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33003\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33095\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33631\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33746\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33821\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35074\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35679\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200901-15.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sourceforge.net/forum/forum.php?forum_id=882903\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT3549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT4298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1663\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:225\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/10/31/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0971.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/498280/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/32020\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1021129\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-685-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/2973\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2008/3400\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0301\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1297\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1771\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/46262\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
var-200810-0643
Vulnerability from variot
Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats. net-snmp of netsnmp_create_subtree_cache Functions include SNMP GETBULK An integer overflow vulnerability exists due to a flaw in processing requests.Crafted by a third party SNMP GETBULK Service interruption due to request (DoS) There is a possibility of being put into a state. Net-SNMP is prone to a remote denial-of-service vulnerability. Successfully exploiting this issue allows remote attackers to cause denial-of-service conditions. This issue affects versions prior to the following: Net-SNMP 5.2.5.1 Net-SNMP 5.3.2.3 Net-SNMP 5.4.2.1. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200901-15
http://security.gentoo.org/
Severity: Normal Title: Net-SNMP: Denial of Service Date: January 21, 2009 Bugs: #245306 ID: 200901-15
Synopsis
A vulnerability in Net-SNMP could lead to a Denial of Service.
Background
Net-SNMP is a collection of tools for generating and retrieving SNMP data. NOTE: The attacker needs to know the community string to exploit this vulnerability.
Workaround
Restrict access to trusted entities only.
Resolution
All Net-SNMP users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.4.2.1"
References
[ 1 ] CVE-2008-4309 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200901-15.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2009 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
VMware Security Advisory
Advisory ID: VMSA-2009-0001 Synopsis: ESX patches address an issue loading corrupt virtual disks and update Service Console packages Issue date: 2009-01-30 Updated on: 2009-01-30 (initial release of advisory) CVE numbers: CVE-2008-4914 CVE-2008-4309 CVE-2008-4226 CVE-2008-4225
- Summary
Updated ESX patches address an issue loading corrupt virtual disks and update Service Console packages for net-snmp and libxml2.
- Relevant releases
VMware ESXi 3.5 without patch ESXe350-200901401-I-SG
VMware ESX 3.5 without patches ESX350-200901401-SG, ESX350-200901409-SG, ESX350-200901410-SG
VMware ESX 3.0.3 without patches ESX303-200901405-SG, ESX303-200901406-SG
VMware ESX 3.0.2 without patches ESX-1007673, ESX-1007674
NOTE: Extended support for ESX 3.5 Update 1 ends on 7/25/2009, users should plan to upgrade to at least ESX 3.5 Update 2 by that time.
Extended support for ESX 3.0.2 Update 1 ends on 2009-08-08.
Users should plan to upgrade to ESX 3.0.3 and preferably to
the newest release available.
- Problem Description
a. Loading a corrupt delta disk may cause ESX to crash
If the VMDK delta disk of a snapshot is corrupt, an ESX host might
crash when the corrupted disk is loaded. VMDK delta files exist
for virtual machines with one or more snapshots. This change ensures
that a corrupt VMDK delta file cannot be used to crash ESX hosts.
A corrupt VMDK delta disk, or virtual machine would have to be loaded
by an administrator.
VMware would like to thank Craig Marshall for reporting this issue.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2008-4914 to this issue.
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi 3.5 ESXi ESXe350-200901401-I-SG
ESX 3.5 ESX ESX350-200901401-SG
ESX 3.0.3 ESX not affected
ESX 3.0.2 ESX not affected
ESX 2.5.5 ESX not affected
* hosted products are VMware Workstation, Player, ACE, Server, Fusion.
b. Updated Service Console package net-snmp
Net-SNMP is an implementation of the Simple Network Management
Protocol (SNMP). SNMP is used by network management systems to
monitor hosts.
A denial-of-service flaw was found in the way Net-SNMP processes
SNMP GETBULK requests. A remote attacker who issued a specially-
crafted request could cause the snmpd server to crash.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2008-4309 to this issue.
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX ESX350-200901409-SG
ESX 3.0.3 ESX ESX303-200901405-SG
ESX 3.0.2 ESX ESX-1007673
ESX 2.5.5 ESX not affected
* hosted products are VMware Workstation, Player, ACE, Server, Fusion.
c. Updated Service Console package libxml2
An integer overflow flaw causing a heap-based buffer overflow was
found in the libxml2 XML parser. If an application linked against
libxml2 processed untrusted, malformed XML content, it could cause
the application to crash or, possibly, execute arbitrary code.
The Common Vulnerabilities and Exposures Project (cve.mitre.org) has
assigned the name CVE-2008-4226 to this issue.
A denial of service flaw was discovered in the libxml2 XML parser.
If an application linked against libxml2 processed untrusted,
malformed XML content, it could cause the application to enter
an infinite loop.
The Common Vulnerabilities and Exposures Project (cve.mitre.org)
has assigned the name CVE-2008-4225 to this issue.
The following table lists what action remediates the vulnerability
(column 4) if a solution is available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
VirtualCenter any Windows not affected
hosted * any any not affected
ESXi 3.5 ESXi not affected
ESX 3.5 ESX ESX350-200901410-SG
ESX 3.0.3 ESX ESX303-200901406-SG
ESX 3.0.2 ESX ESX-1007674
ESX 2.5.5 ESX affected, patch pending
* hosted products are VMware Workstation, Player, ACE, Server, Fusion.
- Solution
Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file.
ESXi
ESXi 3.5 patch ESXe350-200901401-I-SG http://download3.vmware.com/software/vi/ESXe350-200901401-O-SG.zip md5sum: 588dc7bfdee4e4c5ac626906c37fc784 http://kb.vmware.com/kb/1006661
NOTE: The three ESXi patches for Firmware "I", VMware Tools "T," and the VI Client "C" are contained in a single offline "O" download file.
ESX
ESX 3.5 patch ESX350-200901401-SG (VMDK) http://download3.vmware.com/software/vi/ESX350-200901401-SG.zip md5sum: 2769ac30078656b01ca1e2fdfa3230e9 http://kb.vmware.com/kb/1006651
ESX 3.5 patch ESX350-200901409-SG (net-snmp) http://download3.vmware.com/software/vi/ESX350-200901409-SG.zip md5sum: 2c75cd848d9f3c51619b9a7bd60d20a3 http://kb.vmware.com/kb/1006659
ESX 3.5 patch ESX350-200901410-SG (libxml2) http://download3.vmware.com/software/vi/ESX350-200901410-SG.zip md5sum: 061f96373244e7eab3f0d5fe2415ce91 http://kb.vmware.com/kb/1006660
ESX 3.0.3 patch ESX303-200901405-SG (net-snmp) http://download3.vmware.com/software/vi/ESX303-200901405-SG.zip md5sum: 9983b63a1e2dc7fb3d80f0021c1c347c http://kb.vmware.com/kb/1007681
ESX 3.0.3 patch ESX303-200901406-SG (libxml2) http://download3.vmware.com/software/vi/ESX303-200901406-SG.zip md5sum: 2d5a827ccaf406a54dd3a5affee39db0 http://kb.vmware.com/kb/1007682
ESX 3.0.2 patch ESX-1007673 (net-snmp) http://download3.vmware.com/software/vi/ESX-1007673.tgz md5sum: af4a36d2b4d731177210c789df844974 http://kb.vmware.com/kb/1007673
ESX 3.0.2 patch ESX-1007674 (libxml2) http://download3.vmware.com/software/vi/ESX-1007674.tgz md5sum: fb4b5e9a03dea5b9e24cc0766ddd2581 http://kb.vmware.com/kb/1007674
- References
CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4914 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225
- Change log
2009-01-30 VMSA-2009-0001 Initial security advisory after release of patches for ESXi, ESX 3.5, ESX 3.0.3, ESX 3.0.2 on 2009-01-30.
- Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
- security-announce at lists.vmware.com
- bugtraq at securityfocus.com
- full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Center http://www.vmware.com/security
VMware security response policy http://www.vmware.com/support/policies/security_response.html
General support life cycle policy http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html
Copyright 2009 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.8.3 (Build 4028) Charset: utf-8
wj8DBQFJhAYnS2KysvBH1xkRAiqwAJ47A5mvajtIwB6kZCcNcvUGoraANACbBTsD cgkdo5JKkJLgol+Y2VXW1co= =PvKt -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . By default, the public community name grants read-only access, however it is recommended that the default community name be changed in production.
The updated packages have been patched to correct this issue.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309
Updated Packages:
Mandriva Linux 2008.0: 63c576c59db3887c9ff46aea999af904 2008.0/i586/libnet-snmp15-5.4.1-1.2mdv2008.0.i586.rpm 208783bde426bc2994b25eac38a2f6f6 2008.0/i586/libnet-snmp-devel-5.4.1-1.2mdv2008.0.i586.rpm 68d9b48a792253fcb647cb44b024fc6a 2008.0/i586/libnet-snmp-static-devel-5.4.1-1.2mdv2008.0.i586.rpm 837f701fa84fbf24f866332d374baea0 2008.0/i586/net-snmp-5.4.1-1.2mdv2008.0.i586.rpm 6b8e3cde829e41e882a2bbde8f70e5c0 2008.0/i586/net-snmp-mibs-5.4.1-1.2mdv2008.0.i586.rpm 9c8d0a70cd23f49af617ebd950ab913b 2008.0/i586/net-snmp-trapd-5.4.1-1.2mdv2008.0.i586.rpm 27f9666d87ad5c63a170fa515c2cfb79 2008.0/i586/net-snmp-utils-5.4.1-1.2mdv2008.0.i586.rpm fa774042539e5fa60662ea26cf5f79bb 2008.0/i586/perl-NetSNMP-5.4.1-1.2mdv2008.0.i586.rpm 62fd3d953786bb45cc442069a9dbae14 2008.0/SRPMS/net-snmp-5.4.1-1.2mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64: 7862778bf4b9262707dae0101a051e84 2008.0/x86_64/lib64net-snmp15-5.4.1-1.2mdv2008.0.x86_64.rpm 907423d895272503d6684a7f14618a97 2008.0/x86_64/lib64net-snmp-devel-5.4.1-1.2mdv2008.0.x86_64.rpm ba8972ac3af0a41754d7d830237be4a8 2008.0/x86_64/lib64net-snmp-static-devel-5.4.1-1.2mdv2008.0.x86_64.rpm 2f8efd6d1db501439a1da8b205c3ba4b 2008.0/x86_64/net-snmp-5.4.1-1.2mdv2008.0.x86_64.rpm bd431f5a0c11b796223911463216d236 2008.0/x86_64/net-snmp-mibs-5.4.1-1.2mdv2008.0.x86_64.rpm 929e4b2e24137d0aed30e012d2cbee25 2008.0/x86_64/net-snmp-trapd-5.4.1-1.2mdv2008.0.x86_64.rpm 80679956f6b8e3f8095f1767d34cf7c7 2008.0/x86_64/net-snmp-utils-5.4.1-1.2mdv2008.0.x86_64.rpm f8c2af7b036a33dbadf22498933c90b5 2008.0/x86_64/perl-NetSNMP-5.4.1-1.2mdv2008.0.x86_64.rpm 62fd3d953786bb45cc442069a9dbae14 2008.0/SRPMS/net-snmp-5.4.1-1.2mdv2008.0.src.rpm
Mandriva Linux 2008.1: aafe61f1aaaf2e13ef051fc1d7f5ab91 2008.1/i586/libnet-snmp15-5.4.1-5.2mdv2008.1.i586.rpm c7f2b5e4d5955a12b4df0fbf82f38544 2008.1/i586/libnet-snmp-devel-5.4.1-5.2mdv2008.1.i586.rpm f77c410069f938ae382fbee7012a349d 2008.1/i586/libnet-snmp-static-devel-5.4.1-5.2mdv2008.1.i586.rpm 941b90ef50005b50829419575ab80ec1 2008.1/i586/net-snmp-5.4.1-5.2mdv2008.1.i586.rpm d8d459f3213cb97b2708c37c787a7035 2008.1/i586/net-snmp-mibs-5.4.1-5.2mdv2008.1.i586.rpm c753c1d4694d7b8c81f517c0c019accf 2008.1/i586/net-snmp-tkmib-5.4.1-5.2mdv2008.1.i586.rpm 69a0f39e0366cda18fb3cb7440adf2c8 2008.1/i586/net-snmp-trapd-5.4.1-5.2mdv2008.1.i586.rpm 825fe8ac0059480495d5f9f92b41775a 2008.1/i586/net-snmp-utils-5.4.1-5.2mdv2008.1.i586.rpm 61b88005dba39bdad7c18c2774fab3ed 2008.1/i586/perl-NetSNMP-5.4.1-5.2mdv2008.1.i586.rpm 1f73d4a19a2a0a159cdf4d1058ce17f2 2008.1/SRPMS/net-snmp-5.4.1-5.2mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64: c4ddb52926754e188afa827365a9402d 2008.1/x86_64/lib64net-snmp15-5.4.1-5.2mdv2008.1.x86_64.rpm b71406ffbf1fddbe11d4e23636015043 2008.1/x86_64/lib64net-snmp-devel-5.4.1-5.2mdv2008.1.x86_64.rpm fbed296540545616ff8f248b32e7edf2 2008.1/x86_64/lib64net-snmp-static-devel-5.4.1-5.2mdv2008.1.x86_64.rpm 7e4f56fe2433fd5a80b3ec09ca801755 2008.1/x86_64/net-snmp-5.4.1-5.2mdv2008.1.x86_64.rpm 6275046a91fd1aea967f893720348f88 2008.1/x86_64/net-snmp-mibs-5.4.1-5.2mdv2008.1.x86_64.rpm c05711a0a2a0b69652c6d19e3c883e01 2008.1/x86_64/net-snmp-tkmib-5.4.1-5.2mdv2008.1.x86_64.rpm 012b8391c5c49432d270d247e39fa64a 2008.1/x86_64/net-snmp-trapd-5.4.1-5.2mdv2008.1.x86_64.rpm d05bc5b73d566e16b76517fdd90f968d 2008.1/x86_64/net-snmp-utils-5.4.1-5.2mdv2008.1.x86_64.rpm d37bc36bd7a861f71fce000319904387 2008.1/x86_64/perl-NetSNMP-5.4.1-5.2mdv2008.1.x86_64.rpm 1f73d4a19a2a0a159cdf4d1058ce17f2 2008.1/SRPMS/net-snmp-5.4.1-5.2mdv2008.1.src.rpm
Mandriva Linux 2009.0: 67a289261b50a6ec4bbb74503ff15860 2009.0/i586/libnet-snmp15-5.4.2-2.1mdv2009.0.i586.rpm c0b057998d757e7988cac2276cc16d6a 2009.0/i586/libnet-snmp-devel-5.4.2-2.1mdv2009.0.i586.rpm 340271a223791169762e826744d1aab3 2009.0/i586/libnet-snmp-static-devel-5.4.2-2.1mdv2009.0.i586.rpm 4dad88af5b12b6001adc135e54a5f94c 2009.0/i586/net-snmp-5.4.2-2.1mdv2009.0.i586.rpm 41cc69981bd2dd2886f764f46a19c326 2009.0/i586/net-snmp-mibs-5.4.2-2.1mdv2009.0.i586.rpm 84ebcf44ee0d90e956d138ecafe7a9e0 2009.0/i586/net-snmp-tkmib-5.4.2-2.1mdv2009.0.i586.rpm d9ff03f1bb268735f27d4e70e441675a 2009.0/i586/net-snmp-trapd-5.4.2-2.1mdv2009.0.i586.rpm 7d4891eb14e73c8f53cd7bee93dcab4b 2009.0/i586/net-snmp-utils-5.4.2-2.1mdv2009.0.i586.rpm 66d9db711d7064d6326c50414ffe945b 2009.0/i586/perl-NetSNMP-5.4.2-2.1mdv2009.0.i586.rpm 142a9d0f6b5b895e50c93f66dd112459 2009.0/SRPMS/net-snmp-5.4.2-2.1mdv2009.0.src.rpm
Mandriva Linux 2009.0/X86_64: d9b76860696183041c5431b28c133d79 2009.0/x86_64/lib64net-snmp15-5.4.2-2.1mdv2009.0.x86_64.rpm 3868b49eec570997ec1bce4603fdb5b1 2009.0/x86_64/lib64net-snmp-devel-5.4.2-2.1mdv2009.0.x86_64.rpm fde92f379f3e6f5d8e3cd307e0d3866d 2009.0/x86_64/lib64net-snmp-static-devel-5.4.2-2.1mdv2009.0.x86_64.rpm 1265e20f1d23728a740ce3e23f6df279 2009.0/x86_64/net-snmp-5.4.2-2.1mdv2009.0.x86_64.rpm e799c8dbd928539d2993f3a4268cf4fc 2009.0/x86_64/net-snmp-mibs-5.4.2-2.1mdv2009.0.x86_64.rpm f34b37e106fe535c6262c0a20824cb71 2009.0/x86_64/net-snmp-tkmib-5.4.2-2.1mdv2009.0.x86_64.rpm dc838be5485af308d3f560dd3dd23845 2009.0/x86_64/net-snmp-trapd-5.4.2-2.1mdv2009.0.x86_64.rpm 66be00a8327d9e0b9fcd4fb22829fd85 2009.0/x86_64/net-snmp-utils-5.4.2-2.1mdv2009.0.x86_64.rpm b22b8c100f8b74be46f87cd9e33bdee3 2009.0/x86_64/perl-NetSNMP-5.4.2-2.1mdv2009.0.x86_64.rpm 142a9d0f6b5b895e50c93f66dd112459 2009.0/SRPMS/net-snmp-5.4.2-2.1mdv2009.0.src.rpm
Corporate 4.0: e830fee5189a6d99235f8b5465cf1cf8 corporate/4.0/i586/libnet-snmp5-5.2.1.2-5.3.20060mlcs4.i586.rpm a2b4e29f175d2f9cc0ad8709edbbbd87 corporate/4.0/i586/libnet-snmp5-devel-5.2.1.2-5.3.20060mlcs4.i586.rpm 741b5e8a9a8ecaf6f4a2d4849e45bd2f corporate/4.0/i586/libnet-snmp5-static-devel-5.2.1.2-5.3.20060mlcs4.i586.rpm 94da62fa6bdc660c23e308111f73665e corporate/4.0/i586/net-snmp-5.2.1.2-5.3.20060mlcs4.i586.rpm 373a8f3e0bffea791d866c35dab6f2fa corporate/4.0/i586/net-snmp-mibs-5.2.1.2-5.3.20060mlcs4.i586.rpm 002e256aa1c2b0179894f0df8e10e70e corporate/4.0/i586/net-snmp-trapd-5.2.1.2-5.3.20060mlcs4.i586.rpm 23ccf736576e9002e84c09db16953ee6 corporate/4.0/i586/net-snmp-utils-5.2.1.2-5.3.20060mlcs4.i586.rpm 13dc4a180a0be9c5afe36168278ffdf3 corporate/4.0/i586/perl-NetSNMP-5.2.1.2-5.3.20060mlcs4.i586.rpm d9cfd05c0de2b6891761627579ccc1d8 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.3.20060mlcs4.src.rpm
Corporate 4.0/X86_64: 7095df865e54764c051f10040b4de25d corporate/4.0/x86_64/lib64net-snmp5-5.2.1.2-5.3.20060mlcs4.x86_64.rpm 96a8dbf8ec18e76e4fddf52b2d19b93d corporate/4.0/x86_64/lib64net-snmp5-devel-5.2.1.2-5.3.20060mlcs4.x86_64.rpm 9af9807629580025cc1cdaba78826153 corporate/4.0/x86_64/lib64net-snmp5-static-devel-5.2.1.2-5.3.20060mlcs4.x86_64.rpm 91d6d06059463804ae085bf42a702132 corporate/4.0/x86_64/net-snmp-5.2.1.2-5.3.20060mlcs4.x86_64.rpm 47e44f0f67b04eae0c63ab9fc6636f10 corporate/4.0/x86_64/net-snmp-mibs-5.2.1.2-5.3.20060mlcs4.x86_64.rpm 478577d14048824ef556371e43892f0e corporate/4.0/x86_64/net-snmp-trapd-5.2.1.2-5.3.20060mlcs4.x86_64.rpm 2766c681f5366ac9e9bfa74ff7388bd5 corporate/4.0/x86_64/net-snmp-utils-5.2.1.2-5.3.20060mlcs4.x86_64.rpm 4ea12420b159bcecc5d7b2cef2bdeb8b corporate/4.0/x86_64/perl-NetSNMP-5.2.1.2-5.3.20060mlcs4.x86_64.rpm d9cfd05c0de2b6891761627579ccc1d8 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.3.20060mlcs4.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFJEdTsmqjQ0CJFipgRAk0yAJ91M1kRkgQqJovhGgIaofqwrLlWQgCglLwu 8ZyyTGYX15oaOsh4j4Mq4AU= =qPXg -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c01820968 Version: 1
HPSBMA02447 SSRT090062 rev.1 - Insight Control Suite For Linux (ICE-LX) Cross Site Request Forgery (CSRF) , Remote Execution of Arbitrary Code, Denial of Service (DoS), and Other Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2009-08-12 Last Updated: 2009-08-12
Potential Security Impact: Cross Site Request Forgery (CSRF) , Remote Execution of Arbitrary Code, Denial of Service (DoS), and Other Vulnerabilities.
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with Insight Control Suite For Linux (ICE-LX). The vulnerabilities could be remotely exploited to allow Cross Site Request Forgery (CSRF) , Remote Execution of Arbitrary Code, Denial of Service (DoS) and other vulnerabilities.
References: CVE-2009-2677, CVE-2009-0590, CVE-2009-1272, CVE-2008-5161, CVE-2008-4309, CVE-2008-1720
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Insight Control Suite For Linux (ICE-LX) v2.10 or earlier
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2009-2677 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.4 CVE-2009-0590 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2009-1272 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2008-5161 (AV:N/AC:H/Au:N/C:P/I:N/A:N) 2.6 CVE-2008-4309 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2008-1720 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has made the following updated product kit available to resolve the vulnerabilities. The HP ICE-LX v2.11 kit is available as described below.
The update file is HP_ICE_LX_V2.11_511708_004.iso which can be downloaded from here: https://h20392.www2.hp.com/portal/swdepot/try.do?productNumber=HPICELX
The kit can also be obtained by going to http://www.hp.com/go/ice-lx
Open Source packages updated in this version (v2.11) of ICE-LX
net-snmp-5.4.2.1
php 5.2.9
rsync 3.0.5
openssh 5.2 p1
openssl-0.9.8k
PRODUCT SPECIFIC INFORMATION None
HISTORY Version:1 (rev.1) 12 August 2009 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches -check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems -verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
- The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title:
GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2008-0960
Wes Hardaker reported that the SNMPv3 HMAC verification relies on
the client to specify the HMAC length, which allows spoofing of
authenticated SNMPv3 packets.
CVE-2008-2292
John Kortink reported a buffer overflow in the __snprint_value
function in snmp_get causing a denial of service and potentially
allowing the execution of arbitrary code via a large OCTETSTRING
in an attribute value pair (AVP).
For the stable distribution (etch), these problems has been fixed in version 5.2.3-7etch4.
For the testing distribution (lenny) and unstable distribution (sid) these problems have been fixed in version 5.4.1~dfsg-11.
We recommend that you upgrade your net-snmp package.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
Source archives:
http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.diff.gz Size/MD5 checksum: 94030 2ccd6191c3212980956c30de392825ec http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.dsc Size/MD5 checksum: 1046 8018cc23033178515298d5583a74f9ff http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3.orig.tar.gz Size/MD5 checksum: 4006389 ba4bc583413f90618228d0f196da8181
Architecture independent packages:
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-base_5.2.3-7etch4_all.deb Size/MD5 checksum: 1214368 d579d8f28f3d704b6c09b2b480425086 http://security.debian.org/pool/updates/main/n/net-snmp/tkmib_5.2.3-7etch4_all.deb Size/MD5 checksum: 855594 b5ccd827adbcefcca3557fa9ae28cc08
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_alpha.deb Size/MD5 checksum: 2169470 265835564ef2b0e2e86a08000461c53b http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_alpha.deb Size/MD5 checksum: 944098 5b903886ee4740842715797e3231602c http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_alpha.deb Size/MD5 checksum: 1901802 5486eb1f2a5b076e5342b1dd9cbb12e2 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_alpha.deb Size/MD5 checksum: 933202 e3210ba1641079e0c3aaf4a50e89aedd http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_alpha.deb Size/MD5 checksum: 835584 b14db8c5e5b5e2d34799952975f903fb
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_amd64.deb Size/MD5 checksum: 932008 fc79672bf64eaabd41ed1c2f4a42c7da http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_amd64.deb Size/MD5 checksum: 1890766 ae3832515a97a79b31e0e7f0316356ee http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_amd64.deb Size/MD5 checksum: 835088 62867e9ba9dfca3c7e8ae575d5a478f5 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_amd64.deb Size/MD5 checksum: 918844 d2d1bc5f555bc9dba153e2a9a964ffbf http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_amd64.deb Size/MD5 checksum: 1557924 5c2a33a015dd44708a9cc7602ca2525c
arm architecture (ARM)
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_arm.deb Size/MD5 checksum: 909974 4c1cef835efc0b7ff3fea54a618eabee http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_arm.deb Size/MD5 checksum: 835284 3ac835d926481c9e0f589b578455ddee http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_arm.deb Size/MD5 checksum: 928252 b98e98b58c61be02e477185293427d5c http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_arm.deb Size/MD5 checksum: 1778292 b903adf3d1fa6e7a26f7cafb7bffdd6b http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_arm.deb Size/MD5 checksum: 1344158 78b6cf6b2974983e8e3670468da73cd1
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_hppa.deb Size/MD5 checksum: 835940 9eeaf116e386dd7733ab2106c662dfa9 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_hppa.deb Size/MD5 checksum: 1809132 78bb5f1c12b004d32fa265e6bd99ffa1 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_hppa.deb Size/MD5 checksum: 1926116 71c7f3095ffe1bb22e84ade21f32b3a4 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_hppa.deb Size/MD5 checksum: 935434 85deac8531b02a0fdf3c9baa21d8e4bd http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_hppa.deb Size/MD5 checksum: 935640 958cb158264f75772864cd5d5c0bf251
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_i386.deb Size/MD5 checksum: 1423294 f05c7491a8100684c5085588738f05b5 http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_i386.deb Size/MD5 checksum: 833970 cb705c9fe9418cc9348ac935ea7b0ba2 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_i386.deb Size/MD5 checksum: 920070 3df41a0c99c41d1bccf6801011cf8ed5 http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_i386.deb Size/MD5 checksum: 925914 159b4244ef701edbe0fb8c9685b5b477 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_i386.deb Size/MD5 checksum: 1838900 3b7ac7b8fe0da1a3909ee56aba46d464
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_ia64.deb Size/MD5 checksum: 2205680 6868a56b1db04627e6921bf7237939a2 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_ia64.deb Size/MD5 checksum: 970440 783f0cccabfbcc63590730b3803d164d http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_ia64.deb Size/MD5 checksum: 2281114 fd04b505755a3aed0fe4c9baaac84500 http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_ia64.deb Size/MD5 checksum: 842690 9f9ca89c3d3ba7c46481e9cd39c242a6 http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_ia64.deb Size/MD5 checksum: 962854 c8a32f808d719357a5b6350e2b60794e
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mips.deb Size/MD5 checksum: 895414 5dd919d188291cb3727d39b5e06c9e26 http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mips.deb Size/MD5 checksum: 927342 28c245db4d8ea82ba4075b27d674d72a http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mips.deb Size/MD5 checksum: 833182 0e0b21e13d77de82bed7a38d30f65e4b http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mips.deb Size/MD5 checksum: 1769524 24bdc73a3d20c4046c7741957442c713 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mips.deb Size/MD5 checksum: 1717562 977ae5c34a127d32d8f2bf222de9a431
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mipsel.deb Size/MD5 checksum: 1755032 cab5c112911465a9ce23a0d2ea44ded9 http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mipsel.deb Size/MD5 checksum: 926616 2bf14a3fe74d9f2a523aacc8b04f5282 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mipsel.deb Size/MD5 checksum: 895194 b7c9ed37bf83ad92371f5472ac5d917b http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mipsel.deb Size/MD5 checksum: 833098 08b63ba6c3becf25ba2f941a532a7b71 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mipsel.deb Size/MD5 checksum: 1720642 1ff7568eb478edee923edb76cf42e9ac
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_powerpc.deb Size/MD5 checksum: 941434 bbac9384bd7f88339e2b86fa665208c1 http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_powerpc.deb Size/MD5 checksum: 835212 4790d79f8de7f1bee7aabf0473f25268 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_powerpc.deb Size/MD5 checksum: 1657890 b91fcf52e80c7196cea0c13df9ac79ef http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_powerpc.deb Size/MD5 checksum: 1803262 4d298c9509941390c7b2eb68320ad211 http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_powerpc.deb Size/MD5 checksum: 928170 b17966a6a61313344ac827b58f32eeef
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_s390.deb Size/MD5 checksum: 1409718 2a128cbdce2522ef49604255cff41af2 http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_s390.deb Size/MD5 checksum: 931452 d3bb7c3a849cd2b35fa6e4acb19c318d http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_s390.deb Size/MD5 checksum: 1834914 67e5b946df18b06b41b3e108d5ddc4e3 http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_s390.deb Size/MD5 checksum: 836102 7a4b85e8ea0e50d7213997b5f7d6309f http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_s390.deb Size/MD5 checksum: 903864 3f80e78e4e2672aacf3da0690ff24b79
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_sparc.deb Size/MD5 checksum: 925336 5824ea607689f3f1bd62a9e6e28f95ae http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_sparc.deb Size/MD5 checksum: 1548630 1378d1cf730d3026bc1f01a4ab2ccedb http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_sparc.deb Size/MD5 checksum: 918592 28a086f6aa2ee8d510b38c1a177843fc http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_sparc.deb Size/MD5 checksum: 834186 068cbf2b4774ecf9504b820db26e6f1d http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_sparc.deb Size/MD5 checksum: 1782014 d39fae5fe0d1397a2a1bd7397d6e850a
These files will probably be moved into the stable distribution on its next update. =========================================================== Ubuntu Security Notice USN-685-1 December 03, 2008 net-snmp vulnerabilities CVE-2008-0960, CVE-2008-2292, CVE-2008-4309 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 7.10 Ubuntu 8.04 LTS Ubuntu 8.10
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: libsnmp-perl 5.2.1.2-4ubuntu2.3 libsnmp9 5.2.1.2-4ubuntu2.3
Ubuntu 7.10: libsnmp-perl 5.3.1-6ubuntu2.2 libsnmp10 5.3.1-6ubuntu2.2
Ubuntu 8.04 LTS: libsnmp-perl 5.4.1~dfsg-4ubuntu4.2 libsnmp15 5.4.1~dfsg-4ubuntu4.2
Ubuntu 8.10: libsnmp15 5.4.1~dfsg-7.1ubuntu6.1
In general, a standard system upgrade is sufficient to effect the necessary changes.
Details follow:
Wes Hardaker discovered that the SNMP service did not correctly validate HMAC authentication requests. (CVE-2008-0960)
John Kortink discovered that the Net-SNMP Perl module did not correctly check the size of returned values. If a user or automated system were tricked into querying a malicious SNMP server, the application using the Perl module could be made to crash, leading to a denial of service. This did not affect Ubuntu 8.10. (CVE-2008-2292)
It was discovered that the SNMP service did not correctly handle large GETBULK requests. (CVE-2008-4309)
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.diff.gz
Size/MD5: 75402 9655d984a47cec8e27efa4db0b227870
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.dsc
Size/MD5: 838 17a17230a005c1acfd0569757e728fad
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2.orig.tar.gz
Size/MD5: 3869893 34159770a7fe418d99fdd416a75358b1
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.2.1.2-4ubuntu2.3_all.deb
Size/MD5: 1152306 f7647cee4df8db87ab48c0d05635a973
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.2.1.2-4ubuntu2.3_all.deb
Size/MD5: 822946 b9b852c188937d1fffc06d4da01325d5
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_amd64.deb
Size/MD5: 896620 a78012b3f0f13667081f97dc1a4d62e8
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_amd64.deb
Size/MD5: 1497194 7d55b8d1e4ae0c45753bedcf536a1a5a
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_amd64.deb
Size/MD5: 1826252 0550c1401f9bbe5f345fd96484ed369c
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_amd64.deb
Size/MD5: 889330 5ad0ddb2c610973166e4dd07769ba3d3
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_amd64.deb
Size/MD5: 797086 18cf4210342b683d3ee24fe995329b55
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_i386.deb
Size/MD5: 896880 298d27ea1ece6e80bb8931b9a5e61961
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_i386.deb
Size/MD5: 1268472 acbca43ab7ea747fa3e4636d15ef997c
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_i386.deb
Size/MD5: 1710342 bd27290685bcf1d6a23eb8705d3367e7
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_i386.deb
Size/MD5: 881838 58121bd9e4c845da7df4e540645e0e13
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_i386.deb
Size/MD5: 794672 221d1c554bd89f50dc3ac9108a6cef6b
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_powerpc.deb
Size/MD5: 913064 45a033b01c4b31ef90a92988bb5fb229
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_powerpc.deb
Size/MD5: 1590124 b62aa5477d9307d311c811298b7ec3d9
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_powerpc.deb
Size/MD5: 1728094 5214ce9aebe3a8d7a28a1746a81ce8ea
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_powerpc.deb
Size/MD5: 898580 86e6c1b5dfb5bf91f63d7c6786b7abae
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_powerpc.deb
Size/MD5: 796092 1bab28407224f782b2c3ae04b4647333
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_sparc.deb
Size/MD5: 896832 3d233db9682d5654fdad6bc6b5a649ba
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_sparc.deb
Size/MD5: 1485268 064304ead0ca4653136376e8e9039e74
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_sparc.deb
Size/MD5: 1706490 cb76027eb8167e0866a81b93a4da28ed
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_sparc.deb
Size/MD5: 883182 d1ffc12427d92be51efdba3349e74f9a
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_sparc.deb
Size/MD5: 796374 0f3f749ebe4af6111fe49316639004e4
Updated packages for Ubuntu 7.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.diff.gz
Size/MD5: 94646 8b6f9380d9f8c5514a1d4db729c6df04
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.dsc
Size/MD5: 1287 f53866efd3ae4f3c939a77b1005e1f11
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1.orig.tar.gz
Size/MD5: 4210843 360a9783dbc853bab6bda90d961daee5
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.3.1-6ubuntu2.2_all.deb
Size/MD5: 484306 f2d03276d1cdcef7e8b276ad8ca9595d
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.3.1-6ubuntu2.2_all.deb
Size/MD5: 901284 6889b371d4de92eb61bf83b89d8a8c37
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_amd64.deb
Size/MD5: 2541692 1e6de4bd3c3baa444a2e1980a593a40e
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_amd64.deb
Size/MD5: 968940 7efe4bdcb99f311f1c4bb2c3b9d24a4e
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_amd64.deb
Size/MD5: 1200930 821861c24499cfdfa2a82c329c610c16
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_amd64.deb
Size/MD5: 996572 00cc1a4c8c7924124984e666563e73d0
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_amd64.deb
Size/MD5: 908792 a40763280a3bdbe60eca5e07c5d6c30c
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_i386.deb
Size/MD5: 2321524 59d44616802197e1227cf88abddefe36
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_i386.deb
Size/MD5: 967106 a6e5b308d889bdf6f5abe454e35ba474
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_i386.deb
Size/MD5: 1124462 ec99daa26d0fafba6e9f0b874a23bf3d
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_i386.deb
Size/MD5: 991956 cb20b6a4d68a858ffa0846431169d411
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_i386.deb
Size/MD5: 907546 1ab5119e23a16e99203c113d49fc2723
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_lpia.deb
Size/MD5: 2305548 da57690a3327196e0c3684735be23f2e
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_lpia.deb
Size/MD5: 968984 8da336a5fd871be10e6b8d66d3b9c9d3
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_lpia.deb
Size/MD5: 1074500 e4d6690a6a6a543fc0244a29cd350c9b
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_lpia.deb
Size/MD5: 989566 2d2f4b1662e6a2dffafe8e98f00a15e7
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_lpia.deb
Size/MD5: 907596 4274e006754ebc836132166e0f0429a0
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_powerpc.deb
Size/MD5: 2641202 9b2ec56463ee715752b780aa332d8cd0
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_powerpc.deb
Size/MD5: 985722 a2fca8426b7b51e98c39b91a468bf71f
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_powerpc.deb
Size/MD5: 1154496 6073239f7ffead2a5b9c3357ada1602c
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_powerpc.deb
Size/MD5: 1018596 af12cc55597a0d2d3a92b4b5d683bb14
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_powerpc.deb
Size/MD5: 911866 57e2246930e712bdc1b039840d43af48
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_sparc.deb
Size/MD5: 2527568 19b1a0971259a9b99f9c0386f5935bfc
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_sparc.deb
Size/MD5: 970264 d8ae7f0bb10375ad487b14ba031cd013
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_sparc.deb
Size/MD5: 1078842 2401fc4c40352b8c8013e8c5de3b0ecd
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_sparc.deb
Size/MD5: 995228 16b230d3c718d8eb4a023126bd09d7f5
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_sparc.deb
Size/MD5: 908708 1e410a8ddac41ad9faec901c5a638f29
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.diff.gz
Size/MD5: 78642 b4acf50e47be498e579b934f32081d25
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.dsc
Size/MD5: 1447 0abcea5df87851df2aae7ebd1fc00e7a
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz
Size/MD5: 4618308 0ef987c41d3414f2048c94d187a2baeb
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-4ubuntu4.2_all.deb
Size/MD5: 526864 f3a131bf5a4f5c547573430cb66d410c
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-4ubuntu4.2_all.deb
Size/MD5: 102072 2f276f50efdb7e34f7e61f132f7f7cd7
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 1796950 283c5a95206ab74062e0e30eba4e0890
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 142522 9fff294368a7eac39e37fa478ac6609d
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 1296694 d0646a1543c51f14a93b40f972bc1569
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 163178 0378a25e3b2a0bc80ddb8ec720b5557d
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 75960 fcba461f2e2376cad515329791e04a17
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_amd64.deb
Size/MD5: 38512 21d9ecbc86a8e5965047d027e94fd324
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 1556806 39e4f63b841c4b36c022017d66c12f58
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 179478 5f08596ae997792920e238ff8cd2a7ba
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 1098794 38bc61a5b403fb4f626a641a5f13e681
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 157954 66e38c37639f3c68e7e4a933fa953ff3
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 74116 50b3a4d0cfd38585d2711d30cf725e9d
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_i386.deb
Size/MD5: 75038 98cdeec4b1014568b00107a82fc74418
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 1552018 d9dcab084f3b9bf3e8c36cb5db8f141e
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 141508 96061180809cccc975e0d7079e07ed3e
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 1171530 2d91048fe0a2ac9e3a4fddb84c67513e
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 155564 c67ba3aeb2535ee3e7fc4c89e90ba36a
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 74274 db05202893f516398bbe4e2153ef2d6e
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_lpia.deb
Size/MD5: 35552 a75caf212ffb5a0eafe4ba2656c9aae1
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 1874428 0ed8b5f4e6bad74d506d73447de00bd2
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 158374 dfcd7c4455b4bbd3f746368058d09a59
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 1238226 b5b3a81e956cdb14674d571694d1b6d0
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 185314 5e9d8bd56493f75ae8a8691c530aa420
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 83106 75dea32ec7152b7868fabf09d9d5a198
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
Size/MD5: 42928 214fe703fced2e387b48b51dcbb1d6b7
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 1760062 ade4c08289d947d092a5b2ab06517cc7
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 143860 62b7260d618531b0ed5e7871ab7b99a9
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 1159702 28ea81660bbdd9d7982be58d225e8814
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 160236 196e493ce73905446a3764e73b99f332
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 75518 f24e4b0e3e4a7d97c28da99cdc0a47a5
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_sparc.deb
Size/MD5: 38240 873f5e820e381ec2254ed520bcd09af0
Updated packages for Ubuntu 8.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.diff.gz
Size/MD5: 82260 85fb58aa81933f142bd937bca2e18341
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.dsc
Size/MD5: 1956 1ee06f6b731eae435af6a2d438ef909b
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz
Size/MD5: 4618308 0ef987c41d3414f2048c94d187a2baeb
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-7.1ubuntu6.1_all.deb
Size/MD5: 527650 9c56f3d70018b714895a61c0daba9498
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-7.1ubuntu6.1_all.deb
Size/MD5: 103060 108eb50387ca46b4ee38ebb8722ced88
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 1815638 82385081fe2d4eeb1a6c94f9dae672ad
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 146154 1b6249e02e89213f2f4d2aa9c9123420
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 1315628 8443e091f2c63485a422236ad23e55cd
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 165522 154a05824b98e041ceac60ac83709ef4
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 77914 8d6e328f309e78bf1fcf21c2633d82ec
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
Size/MD5: 39930 6b7a1a67ca63b5c843ce66f3547b3c89
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 1569568 dd0599b150eccee9889325d17a7b0769
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 184264 52a54aebef81648164a5bc90f27b0cc5
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 1119072 10c81fe283b25e7ad31fcfd88a2325f0
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 156112 6296f0836bc9797ff48810c79965c3a5
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 74476 bd96a6915eb97fed083aac4daa5f07cf
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
Size/MD5: 77652 3e30e51c362dfa982a3b3197be081328
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 1557614 065f4575c7a2d257fa6b5b9d0cee454f
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 144292 b55f2c4aff8a86499d7f38fd6e773f44
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 1184272 84116fefdce279ce338ffc9614384c06
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 154444 ffe9e765a01695355bdb58008a2910f5
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 73746 762e75672fbd395d2d159513f5d572b0
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
Size/MD5: 36530 0a98b51b94a5f75d4131d657aa766579
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 1884632 a3ad023841ee605efa1e055712b44d9a
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 161074 5586adea8200d2d5bf81f288b5bf7be2
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 1249636 48ec688499fea1dc0ccb3091c0158fb8
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 181952 8ef5f6b9b6c6b8e4fcd5cb37147304a2
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 81802 965218126fb5a49cfcd9e20afeb49782
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
Size/MD5: 43048 09f2f9ed9f519ca5723411802e46d48b
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 1759316 46455cc355c1b808243eada0f134d00b
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 145164 2cdb5b35db853c7c184a44022fc23cd8
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 1159834 cfff424e5bff38bb3ef9419f03465388
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 163042 354f7a5423a34c411c5f8620c66d3e58
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 76994 ca11bcf9a411f618e35e1d6b6ab8c8f9
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
Size/MD5: 38526 172493ec5df1866e2633e074c7f38775
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200810-0643", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "net-snmp", "scope": "eq", "trust": 1.6, "vendor": "net snmp", "version": "5.2.5" }, { "model": "net-snmp", "scope": "eq", "trust": 1.6, "vendor": "net snmp", "version": "5.3.2.2" }, { "model": "net-snmp", "scope": "eq", "trust": 1.6, "vendor": "net snmp", "version": "5.4" }, { "model": "net-snmp", "scope": "lt", "trust": 0.8, "vendor": "net snmp", "version": "5.2.5.1" }, { "model": "net-snmp", "scope": "lt", "trust": 0.8, "vendor": "net snmp", "version": "5.3.2.3" }, { "model": "net-snmp", "scope": "lt", "trust": 0.8, "vendor": "net snmp", "version": "5.4.2.1" }, { "model": "airmac express", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "base station (802.11n)" }, { "model": "airmac extreme", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "base station (802.11n)" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.4.11" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5 to v10.5.6" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.4.11" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5 to v10.5.6" }, { "model": "time capsule", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86-64)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0 (x86-64)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "4.0 (x86-64)" }, { "model": "opensolaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "(sparc)" }, { "model": "opensolaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "(x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (x86)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.0 (client)" }, { "model": "rhel desktop workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (client)" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.3" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.2" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.5" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.10" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 99", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 98", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 96", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 95", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 94", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 93", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 92", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 91", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 90", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 89", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 88", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 87", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 85", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 84", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 83", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 82", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 81", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 80", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 78", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 77", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 76", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 68", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 67", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 64", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 61", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 59", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 58", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 57", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 54", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 51", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 50", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 49", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 47", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 45", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 41", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 39", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 38", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 37", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 36", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 29", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 22", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 19", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 13", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 119", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 118", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 117", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 116", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 115", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 114", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 113", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 112", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 111a", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 111", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 110", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 109", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 108", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 107", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 106", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 105", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 104", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 103", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 102", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 101a", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 101", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 100", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris build snv 02", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "opensolaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "12.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "12.0" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "novell linux desktop", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "appliance platform linux service", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "2" }, { "model": "appliance platform linux service", "scope": "eq", "trust": 0.3, "vendor": "rpath", "version": "1" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "hat enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "4" }, { "model": "hat enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "3" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "pardus", "version": "20080" }, { "model": "net-snmp", "scope": "eq", "trust": 0.3, "vendor": "net snmp", "version": "5.4.1.1" }, { "model": "net-snmp", "scope": "eq", "trust": 0.3, "vendor": "net snmp", "version": "5.4.1" }, { "model": "net-snmp", "scope": "eq", "trust": 0.3, "vendor": "net snmp", "version": "5.3.2.1" }, { "model": "net-snmp", "scope": "eq", "trust": 0.3, "vendor": "net snmp", "version": "5.3.2" }, { "model": "net-snmp", "scope": "eq", "trust": 0.3, "vendor": "net snmp", "version": "5.3" }, { "model": "net-snmp", "scope": "eq", "trust": 0.3, "vendor": "net snmp", "version": "5.2.4.1" }, { "model": "net-snmp", "scope": "eq", "trust": 0.3, "vendor": "net snmp", "version": "5.2.4" }, { "model": "net-snmp", "scope": "eq", "trust": 0.3, "vendor": "net snmp", "version": "5.2.2" }, { "model": "net-snmp", "scope": "eq", "trust": 0.3, "vendor": "net snmp", "version": "5.2.1.2" }, { "model": "net-snmp", "scope": "eq", "trust": 0.3, "vendor": "net snmp", "version": "5.2.1" }, { "model": "net-snmp", "scope": "eq", "trust": 0.3, "vendor": "net snmp", "version": "5.2" }, { "model": "net-snmp", "scope": "eq", "trust": 0.3, "vendor": "net snmp", "version": "5.3.0.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.1" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "insight control for linux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.10" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "messaging storage server mm3.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "messaging storage server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "messaging storage server", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "message networking mn", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "message networking", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "message networking", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "intuity audix lx", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "emmc", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.021" }, { "model": "emmc", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.017" }, { "model": "emmc", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "0" }, { "model": "communication manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0.3" }, { "model": "communication manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1.4" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0.1" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.3.1" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "communication manager sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.2" }, { "model": "communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.1" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1.1" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "aura sip enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1.6" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1.5" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1.4" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1.3" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.2" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "4.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "time capsule", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.5" }, { "model": "time capsule", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.4.2" }, { "model": "time capsule", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.4.1" }, { "model": "time capsule", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.9" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "airport extreme", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.4.2" }, { "model": "airport extreme", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.3.1" }, { "model": "airport extreme", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.2.1" }, { "model": "airport extreme", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.7" }, { "model": "airport extreme", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.5" }, { "model": "airport extreme", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.5" }, { "model": "airport extreme", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1" }, { "model": "airport extreme", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0" }, { "model": "airport extreme base station with 802.11n", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.4.1" }, { "model": "airport extreme base station", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "airport extreme", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "airport express", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.3" }, { "model": "airport express", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1" }, { "model": "airport express base station with 802.11n", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.4.1" }, { "model": "airport express", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "opensolaris build snv 120", "scope": "ne", "trust": 0.3, "vendor": "sun", "version": null }, { "model": "net-snmp", "scope": "ne", "trust": 0.3, "vendor": "net snmp", "version": "5.4.21" }, { "model": "net-snmp", "scope": "ne", "trust": 0.3, "vendor": "net snmp", "version": "5.3.23" }, { "model": "net-snmp", "scope": "ne", "trust": 0.3, "vendor": "net snmp", "version": "5.2.51" }, { "model": "insight control", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "time capsule", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "7.5.2" }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.5.7" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.5.7" }, { "model": "airport extreme base station with 802.11n", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "7.5.2" }, { "model": "airport express base station with 802.11n", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "7.5.2" } ], "sources": [ { "db": "BID", "id": "32020" }, { "db": "JVNDB", "id": "JVNDB-2008-001912" }, { "db": "CNNVD", "id": "CNNVD-200810-516" }, { "db": "NVD", "id": "CVE-2008-4309" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:net-snmp:net-snmp", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:airmac_extreme", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:apple:time_capsule", "vulnerable": true }, { "cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:sun:opensolaris", "vulnerable": true }, { "cpe22Uri": "cpe:/o:sun:solaris", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:rhel_desktop_workstation", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001912" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Oscar Mira-Sanchez", "sources": [ { "db": "BID", "id": "32020" }, { "db": "CNNVD", "id": "CNNVD-200810-516" } ], "trust": 0.9 }, "cve": "CVE-2008-4309", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2008-4309", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-4309", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2008-4309", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200810-516", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2008-4309", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2008-4309" }, { "db": "JVNDB", "id": "JVNDB-2008-001912" }, { "db": "CNNVD", "id": "CNNVD-200810-516" }, { "db": "NVD", "id": "CVE-2008-4309" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats. net-snmp of netsnmp_create_subtree_cache Functions include SNMP GETBULK An integer overflow vulnerability exists due to a flaw in processing requests.Crafted by a third party SNMP GETBULK Service interruption due to request (DoS) There is a possibility of being put into a state. Net-SNMP is prone to a remote denial-of-service vulnerability. \nSuccessfully exploiting this issue allows remote attackers to cause denial-of-service conditions. \nThis issue affects versions *prior to* the following:\nNet-SNMP 5.2.5.1\nNet-SNMP 5.3.2.3\nNet-SNMP 5.4.2.1. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 200901-15\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Net-SNMP: Denial of Service\n Date: January 21, 2009\n Bugs: #245306\n ID: 200901-15\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nA vulnerability in Net-SNMP could lead to a Denial of Service. \n\nBackground\n==========\n\nNet-SNMP is a collection of tools for generating and retrieving SNMP\ndata. NOTE: The attacker needs to know the community string to\nexploit this vulnerability. \n\nWorkaround\n==========\n\nRestrict access to trusted entities only. \n\nResolution\n==========\n\nAll Net-SNMP users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-analyzer/net-snmp-5.4.2.1\"\n\nReferences\n==========\n\n [ 1 ] CVE-2008-4309\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200901-15.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2009 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ------------------------------------------------------------------------\n VMware Security Advisory\n\nAdvisory ID: VMSA-2009-0001\nSynopsis: ESX patches address an issue loading corrupt virtual\n disks and update Service Console packages\nIssue date: 2009-01-30\nUpdated on: 2009-01-30 (initial release of advisory)\nCVE numbers: CVE-2008-4914 CVE-2008-4309 CVE-2008-4226\n CVE-2008-4225\n- ------------------------------------------------------------------------\n\n1. Summary\n\n Updated ESX patches address an issue loading corrupt\n virtual disks and update Service Console packages\n for net-snmp and libxml2. \n\n2. Relevant releases\n\n VMware ESXi 3.5 without patch ESXe350-200901401-I-SG\n\n VMware ESX 3.5 without patches ESX350-200901401-SG,\n ESX350-200901409-SG,\n ESX350-200901410-SG\n\n VMware ESX 3.0.3 without patches ESX303-200901405-SG,\n ESX303-200901406-SG\n\n VMware ESX 3.0.2 without patches ESX-1007673, ESX-1007674\n\n NOTE: Extended support for ESX 3.5 Update 1 ends on 7/25/2009, users\n should plan to upgrade to at least ESX 3.5 Update 2 by that\n time. \n\n Extended support for ESX 3.0.2 Update 1 ends on 2009-08-08. \n Users should plan to upgrade to ESX 3.0.3 and preferably to\n the newest release available. \n\n3. Problem Description\n\n a. Loading a corrupt delta disk may cause ESX to crash\n\n If the VMDK delta disk of a snapshot is corrupt, an ESX host might\n crash when the corrupted disk is loaded. VMDK delta files exist\n for virtual machines with one or more snapshots. This change ensures\n that a corrupt VMDK delta file cannot be used to crash ESX hosts. \n\n A corrupt VMDK delta disk, or virtual machine would have to be loaded\n by an administrator. \n\n VMware would like to thank Craig Marshall for reporting this issue. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2008-4914 to this issue. \n\n The following table lists what action remediates the vulnerability\n (column 4) if a solution is available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi 3.5 ESXi ESXe350-200901401-I-SG\n\n ESX 3.5 ESX ESX350-200901401-SG\n ESX 3.0.3 ESX not affected\n ESX 3.0.2 ESX not affected\n ESX 2.5.5 ESX not affected\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n b. Updated Service Console package net-snmp\n\n Net-SNMP is an implementation of the Simple Network Management\n Protocol (SNMP). SNMP is used by network management systems to\n monitor hosts. \n\n A denial-of-service flaw was found in the way Net-SNMP processes\n SNMP GETBULK requests. A remote attacker who issued a specially-\n crafted request could cause the snmpd server to crash. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2008-4309 to this issue. \n\n The following table lists what action remediates the vulnerability\n (column 4) if a solution is available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi 3.5 ESXi not affected\n\n ESX 3.5 ESX ESX350-200901409-SG\n ESX 3.0.3 ESX ESX303-200901405-SG\n ESX 3.0.2 ESX ESX-1007673\n ESX 2.5.5 ESX not affected\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n c. Updated Service Console package libxml2\n\n An integer overflow flaw causing a heap-based buffer overflow was\n found in the libxml2 XML parser. If an application linked against\n libxml2 processed untrusted, malformed XML content, it could cause\n the application to crash or, possibly, execute arbitrary code. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org) has\n assigned the name CVE-2008-4226 to this issue. \n\n A denial of service flaw was discovered in the libxml2 XML parser. \n If an application linked against libxml2 processed untrusted,\n malformed XML content, it could cause the application to enter\n an infinite loop. \n\n The Common Vulnerabilities and Exposures Project (cve.mitre.org)\n has assigned the name CVE-2008-4225 to this issue. \n\n The following table lists what action remediates the vulnerability\n (column 4) if a solution is available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n VirtualCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi 3.5 ESXi not affected\n\n ESX 3.5 ESX ESX350-200901410-SG\n ESX 3.0.3 ESX ESX303-200901406-SG\n ESX 3.0.2 ESX ESX-1007674\n ESX 2.5.5 ESX affected, patch pending\n\n * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n4. Solution\n\n Please review the patch/release notes for your product and version\n and verify the md5sum of your downloaded file. \n\n ESXi\n ----\n ESXi 3.5 patch ESXe350-200901401-I-SG\n http://download3.vmware.com/software/vi/ESXe350-200901401-O-SG.zip\n md5sum: 588dc7bfdee4e4c5ac626906c37fc784\n http://kb.vmware.com/kb/1006661\n\n NOTE: The three ESXi patches for Firmware \"I\", VMware Tools \"T,\" and\n the VI Client \"C\" are contained in a single offline \"O\"\n download file. \n\n ESX\n ---\n ESX 3.5 patch ESX350-200901401-SG (VMDK)\n http://download3.vmware.com/software/vi/ESX350-200901401-SG.zip\n md5sum: 2769ac30078656b01ca1e2fdfa3230e9\n http://kb.vmware.com/kb/1006651\n\n ESX 3.5 patch ESX350-200901409-SG (net-snmp)\n http://download3.vmware.com/software/vi/ESX350-200901409-SG.zip\n md5sum: 2c75cd848d9f3c51619b9a7bd60d20a3\n http://kb.vmware.com/kb/1006659\n\n ESX 3.5 patch ESX350-200901410-SG (libxml2)\n http://download3.vmware.com/software/vi/ESX350-200901410-SG.zip\n md5sum: 061f96373244e7eab3f0d5fe2415ce91\n http://kb.vmware.com/kb/1006660\n\n ESX 3.0.3 patch ESX303-200901405-SG (net-snmp)\n http://download3.vmware.com/software/vi/ESX303-200901405-SG.zip\n md5sum: 9983b63a1e2dc7fb3d80f0021c1c347c\n http://kb.vmware.com/kb/1007681\n\n ESX 3.0.3 patch ESX303-200901406-SG (libxml2)\n http://download3.vmware.com/software/vi/ESX303-200901406-SG.zip\n md5sum: 2d5a827ccaf406a54dd3a5affee39db0\n http://kb.vmware.com/kb/1007682\n\n ESX 3.0.2 patch ESX-1007673 (net-snmp)\n http://download3.vmware.com/software/vi/ESX-1007673.tgz\n md5sum: af4a36d2b4d731177210c789df844974\n http://kb.vmware.com/kb/1007673\n\n ESX 3.0.2 patch ESX-1007674 (libxml2)\n http://download3.vmware.com/software/vi/ESX-1007674.tgz\n md5sum: fb4b5e9a03dea5b9e24cc0766ddd2581\n http://kb.vmware.com/kb/1007674\n\n5. References\n\n CVE numbers\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4914\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225\n\n- ------------------------------------------------------------------------\n6. Change log\n\n2009-01-30 VMSA-2009-0001\nInitial security advisory after release of patches for ESXi, ESX 3.5,\nESX 3.0.3, ESX 3.0.2 on 2009-01-30. \n\n- -----------------------------------------------------------------------\n7. Contact\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n * security-announce at lists.vmware.com\n * bugtraq at securityfocus.com\n * full-disclosure at lists.grok.org.uk\n\nE-mail: security at vmware.com\nPGP key at: http://kb.vmware.com/kb/1055\n\nVMware Security Center\nhttp://www.vmware.com/security\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2009 VMware Inc. All rights reserved. \n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: PGP Desktop 9.8.3 (Build 4028)\nCharset: utf-8\n\nwj8DBQFJhAYnS2KysvBH1xkRAiqwAJ47A5mvajtIwB6kZCcNcvUGoraANACbBTsD\ncgkdo5JKkJLgol+Y2VXW1co=\n=PvKt\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. By default, the public\n community name grants read-only access, however it is recommended\n that the default community name be changed in production. \n \n The updated packages have been patched to correct this issue. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Linux 2008.0:\n 63c576c59db3887c9ff46aea999af904 2008.0/i586/libnet-snmp15-5.4.1-1.2mdv2008.0.i586.rpm\n 208783bde426bc2994b25eac38a2f6f6 2008.0/i586/libnet-snmp-devel-5.4.1-1.2mdv2008.0.i586.rpm\n 68d9b48a792253fcb647cb44b024fc6a 2008.0/i586/libnet-snmp-static-devel-5.4.1-1.2mdv2008.0.i586.rpm\n 837f701fa84fbf24f866332d374baea0 2008.0/i586/net-snmp-5.4.1-1.2mdv2008.0.i586.rpm\n 6b8e3cde829e41e882a2bbde8f70e5c0 2008.0/i586/net-snmp-mibs-5.4.1-1.2mdv2008.0.i586.rpm\n 9c8d0a70cd23f49af617ebd950ab913b 2008.0/i586/net-snmp-trapd-5.4.1-1.2mdv2008.0.i586.rpm\n 27f9666d87ad5c63a170fa515c2cfb79 2008.0/i586/net-snmp-utils-5.4.1-1.2mdv2008.0.i586.rpm\n fa774042539e5fa60662ea26cf5f79bb 2008.0/i586/perl-NetSNMP-5.4.1-1.2mdv2008.0.i586.rpm \n 62fd3d953786bb45cc442069a9dbae14 2008.0/SRPMS/net-snmp-5.4.1-1.2mdv2008.0.src.rpm\n\n Mandriva Linux 2008.0/X86_64:\n 7862778bf4b9262707dae0101a051e84 2008.0/x86_64/lib64net-snmp15-5.4.1-1.2mdv2008.0.x86_64.rpm\n 907423d895272503d6684a7f14618a97 2008.0/x86_64/lib64net-snmp-devel-5.4.1-1.2mdv2008.0.x86_64.rpm\n ba8972ac3af0a41754d7d830237be4a8 2008.0/x86_64/lib64net-snmp-static-devel-5.4.1-1.2mdv2008.0.x86_64.rpm\n 2f8efd6d1db501439a1da8b205c3ba4b 2008.0/x86_64/net-snmp-5.4.1-1.2mdv2008.0.x86_64.rpm\n bd431f5a0c11b796223911463216d236 2008.0/x86_64/net-snmp-mibs-5.4.1-1.2mdv2008.0.x86_64.rpm\n 929e4b2e24137d0aed30e012d2cbee25 2008.0/x86_64/net-snmp-trapd-5.4.1-1.2mdv2008.0.x86_64.rpm\n 80679956f6b8e3f8095f1767d34cf7c7 2008.0/x86_64/net-snmp-utils-5.4.1-1.2mdv2008.0.x86_64.rpm\n f8c2af7b036a33dbadf22498933c90b5 2008.0/x86_64/perl-NetSNMP-5.4.1-1.2mdv2008.0.x86_64.rpm \n 62fd3d953786bb45cc442069a9dbae14 2008.0/SRPMS/net-snmp-5.4.1-1.2mdv2008.0.src.rpm\n\n Mandriva Linux 2008.1:\n aafe61f1aaaf2e13ef051fc1d7f5ab91 2008.1/i586/libnet-snmp15-5.4.1-5.2mdv2008.1.i586.rpm\n c7f2b5e4d5955a12b4df0fbf82f38544 2008.1/i586/libnet-snmp-devel-5.4.1-5.2mdv2008.1.i586.rpm\n f77c410069f938ae382fbee7012a349d 2008.1/i586/libnet-snmp-static-devel-5.4.1-5.2mdv2008.1.i586.rpm\n 941b90ef50005b50829419575ab80ec1 2008.1/i586/net-snmp-5.4.1-5.2mdv2008.1.i586.rpm\n d8d459f3213cb97b2708c37c787a7035 2008.1/i586/net-snmp-mibs-5.4.1-5.2mdv2008.1.i586.rpm\n c753c1d4694d7b8c81f517c0c019accf 2008.1/i586/net-snmp-tkmib-5.4.1-5.2mdv2008.1.i586.rpm\n 69a0f39e0366cda18fb3cb7440adf2c8 2008.1/i586/net-snmp-trapd-5.4.1-5.2mdv2008.1.i586.rpm\n 825fe8ac0059480495d5f9f92b41775a 2008.1/i586/net-snmp-utils-5.4.1-5.2mdv2008.1.i586.rpm\n 61b88005dba39bdad7c18c2774fab3ed 2008.1/i586/perl-NetSNMP-5.4.1-5.2mdv2008.1.i586.rpm \n 1f73d4a19a2a0a159cdf4d1058ce17f2 2008.1/SRPMS/net-snmp-5.4.1-5.2mdv2008.1.src.rpm\n\n Mandriva Linux 2008.1/X86_64:\n c4ddb52926754e188afa827365a9402d 2008.1/x86_64/lib64net-snmp15-5.4.1-5.2mdv2008.1.x86_64.rpm\n b71406ffbf1fddbe11d4e23636015043 2008.1/x86_64/lib64net-snmp-devel-5.4.1-5.2mdv2008.1.x86_64.rpm\n fbed296540545616ff8f248b32e7edf2 2008.1/x86_64/lib64net-snmp-static-devel-5.4.1-5.2mdv2008.1.x86_64.rpm\n 7e4f56fe2433fd5a80b3ec09ca801755 2008.1/x86_64/net-snmp-5.4.1-5.2mdv2008.1.x86_64.rpm\n 6275046a91fd1aea967f893720348f88 2008.1/x86_64/net-snmp-mibs-5.4.1-5.2mdv2008.1.x86_64.rpm\n c05711a0a2a0b69652c6d19e3c883e01 2008.1/x86_64/net-snmp-tkmib-5.4.1-5.2mdv2008.1.x86_64.rpm\n 012b8391c5c49432d270d247e39fa64a 2008.1/x86_64/net-snmp-trapd-5.4.1-5.2mdv2008.1.x86_64.rpm\n d05bc5b73d566e16b76517fdd90f968d 2008.1/x86_64/net-snmp-utils-5.4.1-5.2mdv2008.1.x86_64.rpm\n d37bc36bd7a861f71fce000319904387 2008.1/x86_64/perl-NetSNMP-5.4.1-5.2mdv2008.1.x86_64.rpm \n 1f73d4a19a2a0a159cdf4d1058ce17f2 2008.1/SRPMS/net-snmp-5.4.1-5.2mdv2008.1.src.rpm\n\n Mandriva Linux 2009.0:\n 67a289261b50a6ec4bbb74503ff15860 2009.0/i586/libnet-snmp15-5.4.2-2.1mdv2009.0.i586.rpm\n c0b057998d757e7988cac2276cc16d6a 2009.0/i586/libnet-snmp-devel-5.4.2-2.1mdv2009.0.i586.rpm\n 340271a223791169762e826744d1aab3 2009.0/i586/libnet-snmp-static-devel-5.4.2-2.1mdv2009.0.i586.rpm\n 4dad88af5b12b6001adc135e54a5f94c 2009.0/i586/net-snmp-5.4.2-2.1mdv2009.0.i586.rpm\n 41cc69981bd2dd2886f764f46a19c326 2009.0/i586/net-snmp-mibs-5.4.2-2.1mdv2009.0.i586.rpm\n 84ebcf44ee0d90e956d138ecafe7a9e0 2009.0/i586/net-snmp-tkmib-5.4.2-2.1mdv2009.0.i586.rpm\n d9ff03f1bb268735f27d4e70e441675a 2009.0/i586/net-snmp-trapd-5.4.2-2.1mdv2009.0.i586.rpm\n 7d4891eb14e73c8f53cd7bee93dcab4b 2009.0/i586/net-snmp-utils-5.4.2-2.1mdv2009.0.i586.rpm\n 66d9db711d7064d6326c50414ffe945b 2009.0/i586/perl-NetSNMP-5.4.2-2.1mdv2009.0.i586.rpm \n 142a9d0f6b5b895e50c93f66dd112459 2009.0/SRPMS/net-snmp-5.4.2-2.1mdv2009.0.src.rpm\n\n Mandriva Linux 2009.0/X86_64:\n d9b76860696183041c5431b28c133d79 2009.0/x86_64/lib64net-snmp15-5.4.2-2.1mdv2009.0.x86_64.rpm\n 3868b49eec570997ec1bce4603fdb5b1 2009.0/x86_64/lib64net-snmp-devel-5.4.2-2.1mdv2009.0.x86_64.rpm\n fde92f379f3e6f5d8e3cd307e0d3866d 2009.0/x86_64/lib64net-snmp-static-devel-5.4.2-2.1mdv2009.0.x86_64.rpm\n 1265e20f1d23728a740ce3e23f6df279 2009.0/x86_64/net-snmp-5.4.2-2.1mdv2009.0.x86_64.rpm\n e799c8dbd928539d2993f3a4268cf4fc 2009.0/x86_64/net-snmp-mibs-5.4.2-2.1mdv2009.0.x86_64.rpm\n f34b37e106fe535c6262c0a20824cb71 2009.0/x86_64/net-snmp-tkmib-5.4.2-2.1mdv2009.0.x86_64.rpm\n dc838be5485af308d3f560dd3dd23845 2009.0/x86_64/net-snmp-trapd-5.4.2-2.1mdv2009.0.x86_64.rpm\n 66be00a8327d9e0b9fcd4fb22829fd85 2009.0/x86_64/net-snmp-utils-5.4.2-2.1mdv2009.0.x86_64.rpm\n b22b8c100f8b74be46f87cd9e33bdee3 2009.0/x86_64/perl-NetSNMP-5.4.2-2.1mdv2009.0.x86_64.rpm \n 142a9d0f6b5b895e50c93f66dd112459 2009.0/SRPMS/net-snmp-5.4.2-2.1mdv2009.0.src.rpm\n\n Corporate 4.0:\n e830fee5189a6d99235f8b5465cf1cf8 corporate/4.0/i586/libnet-snmp5-5.2.1.2-5.3.20060mlcs4.i586.rpm\n a2b4e29f175d2f9cc0ad8709edbbbd87 corporate/4.0/i586/libnet-snmp5-devel-5.2.1.2-5.3.20060mlcs4.i586.rpm\n 741b5e8a9a8ecaf6f4a2d4849e45bd2f corporate/4.0/i586/libnet-snmp5-static-devel-5.2.1.2-5.3.20060mlcs4.i586.rpm\n 94da62fa6bdc660c23e308111f73665e corporate/4.0/i586/net-snmp-5.2.1.2-5.3.20060mlcs4.i586.rpm\n 373a8f3e0bffea791d866c35dab6f2fa corporate/4.0/i586/net-snmp-mibs-5.2.1.2-5.3.20060mlcs4.i586.rpm\n 002e256aa1c2b0179894f0df8e10e70e corporate/4.0/i586/net-snmp-trapd-5.2.1.2-5.3.20060mlcs4.i586.rpm\n 23ccf736576e9002e84c09db16953ee6 corporate/4.0/i586/net-snmp-utils-5.2.1.2-5.3.20060mlcs4.i586.rpm\n 13dc4a180a0be9c5afe36168278ffdf3 corporate/4.0/i586/perl-NetSNMP-5.2.1.2-5.3.20060mlcs4.i586.rpm \n d9cfd05c0de2b6891761627579ccc1d8 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.3.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n 7095df865e54764c051f10040b4de25d corporate/4.0/x86_64/lib64net-snmp5-5.2.1.2-5.3.20060mlcs4.x86_64.rpm\n 96a8dbf8ec18e76e4fddf52b2d19b93d corporate/4.0/x86_64/lib64net-snmp5-devel-5.2.1.2-5.3.20060mlcs4.x86_64.rpm\n 9af9807629580025cc1cdaba78826153 corporate/4.0/x86_64/lib64net-snmp5-static-devel-5.2.1.2-5.3.20060mlcs4.x86_64.rpm\n 91d6d06059463804ae085bf42a702132 corporate/4.0/x86_64/net-snmp-5.2.1.2-5.3.20060mlcs4.x86_64.rpm\n 47e44f0f67b04eae0c63ab9fc6636f10 corporate/4.0/x86_64/net-snmp-mibs-5.2.1.2-5.3.20060mlcs4.x86_64.rpm\n 478577d14048824ef556371e43892f0e corporate/4.0/x86_64/net-snmp-trapd-5.2.1.2-5.3.20060mlcs4.x86_64.rpm\n 2766c681f5366ac9e9bfa74ff7388bd5 corporate/4.0/x86_64/net-snmp-utils-5.2.1.2-5.3.20060mlcs4.x86_64.rpm\n 4ea12420b159bcecc5d7b2cef2bdeb8b corporate/4.0/x86_64/perl-NetSNMP-5.2.1.2-5.3.20060mlcs4.x86_64.rpm \n d9cfd05c0de2b6891761627579ccc1d8 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.3.20060mlcs4.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFJEdTsmqjQ0CJFipgRAk0yAJ91M1kRkgQqJovhGgIaofqwrLlWQgCglLwu\n8ZyyTGYX15oaOsh4j4Mq4AU=\n=qPXg\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c01820968\nVersion: 1\n\nHPSBMA02447 SSRT090062 rev.1 - Insight Control Suite For Linux (ICE-LX) Cross Site Request Forgery (CSRF) , Remote Execution of Arbitrary Code, Denial of Service (DoS), and Other Vulnerabilities\n\nNOTICE: The information in this Security Bulletin should be acted upon as soon as possible. \n\nRelease Date: 2009-08-12\nLast Updated: 2009-08-12\n\nPotential Security Impact: Cross Site Request Forgery (CSRF) , Remote Execution of Arbitrary Code, Denial of Service (DoS), and Other Vulnerabilities. \n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with Insight Control Suite For Linux (ICE-LX). The vulnerabilities could be remotely exploited to allow Cross Site Request Forgery (CSRF) , Remote Execution of Arbitrary Code, Denial of Service (DoS) and other vulnerabilities. \n\nReferences: CVE-2009-2677, CVE-2009-0590, CVE-2009-1272, CVE-2008-5161, CVE-2008-4309, CVE-2008-1720\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nInsight Control Suite For Linux (ICE-LX) v2.10 or earlier\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2009-2677 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.4\nCVE-2009-0590 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2009-1272 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2008-5161 (AV:N/AC:H/Au:N/C:P/I:N/A:N) 2.6\nCVE-2008-4309 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2008-1720 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has made the following updated product kit available to resolve the vulnerabilities. The HP ICE-LX v2.11 kit is available as described below. \n\nThe update file is HP_ICE_LX_V2.11_511708_004.iso which can be downloaded from here: https://h20392.www2.hp.com/portal/swdepot/try.do?productNumber=HPICELX\n\nThe kit can also be obtained by going to http://www.hp.com/go/ice-lx\n\nOpen Source packages updated in this version (v2.11) of ICE-LX\n\nnet-snmp-5.4.2.1\n\nphp 5.2.9\n\nrsync 3.0.5\n\nopenssh 5.2 p1\n\nopenssl-0.9.8k\n\nPRODUCT SPECIFIC INFORMATION\nNone\n\nHISTORY\nVersion:1 (rev.1) 12 August 2009 Initial release\n\nThird Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer\u0027s patch management policy. \n\nSupport: For further information, contact normal HP Services support channel. \n\nReport: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com\nIt is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. \nTo get the security-alert PGP key, please send an e-mail message as follows:\n To: security-alert@hp.com\n Subject: get key\nSubscribe: To initiate a subscription to receive future HP Security Bulletins via Email:\nhttp://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA\u0026langcode=USENG\u0026jumpid=in_SC-GEN__driverITRC\u0026topiccode=ITRC\nOn the web page: ITRC security bulletins and patch sign-up\nUnder Step1: your ITRC security bulletins and patches\n -check ALL categories for which alerts are required and continue. \nUnder Step2: your ITRC operating systems\n -verify your operating system selections are checked and save. \n\nTo update an existing subscription: http://h30046.www3.hp.com/subSignIn.php\nLog in on the web page: Subscriber\u0027s choice for Business: sign-in. \nOn the web page: Subscriber\u0027s Choice: your profile summary - use Edit Profile to update appropriate sections. \n\nTo review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do\n\n* The Software Product Category that this Security Bulletin\nrelates to is represented by the 5th and 6th characters\nof the Bulletin number in the title:\n\nGN = HP General SW\nMA = HP Management Agents\nMI = Misc. 3rd Party SW\nMP = HP MPE/iX\nNS = HP NonStop Servers\nOV = HP OpenVMS\nPI = HP Printing \u0026 Imaging\nST = HP Storage SW\nTL = HP Trusted Linux\nTU = HP Tru64 UNIX\nUX = HP-UX\nVV = HP VirtualVault\n\nSystem management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. \n\n\"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user\u0027s use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement.\"\n\nCopyright 2009 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. The Common\nVulnerabilities and Exposures project identifies the following problems:\n \nCVE-2008-0960\n \n Wes Hardaker reported that the SNMPv3 HMAC verification relies on\n the client to specify the HMAC length, which allows spoofing of\n authenticated SNMPv3 packets. \n \nCVE-2008-2292\n \n John Kortink reported a buffer overflow in the __snprint_value\n function in snmp_get causing a denial of service and potentially\n allowing the execution of arbitrary code via a large OCTETSTRING \n in an attribute value pair (AVP). \n\nFor the stable distribution (etch), these problems has been fixed in\nversion 5.2.3-7etch4. \n \nFor the testing distribution (lenny) and unstable distribution (sid)\nthese problems have been fixed in version 5.4.1~dfsg-11. \n\nWe recommend that you upgrade your net-snmp package. \n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.diff.gz\n Size/MD5 checksum: 94030 2ccd6191c3212980956c30de392825ec\n http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.dsc\n Size/MD5 checksum: 1046 8018cc23033178515298d5583a74f9ff\n http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3.orig.tar.gz\n Size/MD5 checksum: 4006389 ba4bc583413f90618228d0f196da8181\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-base_5.2.3-7etch4_all.deb\n Size/MD5 checksum: 1214368 d579d8f28f3d704b6c09b2b480425086\n http://security.debian.org/pool/updates/main/n/net-snmp/tkmib_5.2.3-7etch4_all.deb\n Size/MD5 checksum: 855594 b5ccd827adbcefcca3557fa9ae28cc08\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_alpha.deb\n Size/MD5 checksum: 2169470 265835564ef2b0e2e86a08000461c53b\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_alpha.deb\n Size/MD5 checksum: 944098 5b903886ee4740842715797e3231602c\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_alpha.deb\n Size/MD5 checksum: 1901802 5486eb1f2a5b076e5342b1dd9cbb12e2\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_alpha.deb\n Size/MD5 checksum: 933202 e3210ba1641079e0c3aaf4a50e89aedd\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_alpha.deb\n Size/MD5 checksum: 835584 b14db8c5e5b5e2d34799952975f903fb\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_amd64.deb\n Size/MD5 checksum: 932008 fc79672bf64eaabd41ed1c2f4a42c7da\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_amd64.deb\n Size/MD5 checksum: 1890766 ae3832515a97a79b31e0e7f0316356ee\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_amd64.deb\n Size/MD5 checksum: 835088 62867e9ba9dfca3c7e8ae575d5a478f5\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_amd64.deb\n Size/MD5 checksum: 918844 d2d1bc5f555bc9dba153e2a9a964ffbf\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_amd64.deb\n Size/MD5 checksum: 1557924 5c2a33a015dd44708a9cc7602ca2525c\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_arm.deb\n Size/MD5 checksum: 909974 4c1cef835efc0b7ff3fea54a618eabee\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_arm.deb\n Size/MD5 checksum: 835284 3ac835d926481c9e0f589b578455ddee\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_arm.deb\n Size/MD5 checksum: 928252 b98e98b58c61be02e477185293427d5c\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_arm.deb\n Size/MD5 checksum: 1778292 b903adf3d1fa6e7a26f7cafb7bffdd6b\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_arm.deb\n Size/MD5 checksum: 1344158 78b6cf6b2974983e8e3670468da73cd1\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_hppa.deb\n Size/MD5 checksum: 835940 9eeaf116e386dd7733ab2106c662dfa9\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_hppa.deb\n Size/MD5 checksum: 1809132 78bb5f1c12b004d32fa265e6bd99ffa1\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_hppa.deb\n Size/MD5 checksum: 1926116 71c7f3095ffe1bb22e84ade21f32b3a4\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_hppa.deb\n Size/MD5 checksum: 935434 85deac8531b02a0fdf3c9baa21d8e4bd\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_hppa.deb\n Size/MD5 checksum: 935640 958cb158264f75772864cd5d5c0bf251\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_i386.deb\n Size/MD5 checksum: 1423294 f05c7491a8100684c5085588738f05b5\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_i386.deb\n Size/MD5 checksum: 833970 cb705c9fe9418cc9348ac935ea7b0ba2\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_i386.deb\n Size/MD5 checksum: 920070 3df41a0c99c41d1bccf6801011cf8ed5\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_i386.deb\n Size/MD5 checksum: 925914 159b4244ef701edbe0fb8c9685b5b477\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_i386.deb\n Size/MD5 checksum: 1838900 3b7ac7b8fe0da1a3909ee56aba46d464\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_ia64.deb\n Size/MD5 checksum: 2205680 6868a56b1db04627e6921bf7237939a2\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_ia64.deb\n Size/MD5 checksum: 970440 783f0cccabfbcc63590730b3803d164d\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_ia64.deb\n Size/MD5 checksum: 2281114 fd04b505755a3aed0fe4c9baaac84500\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_ia64.deb\n Size/MD5 checksum: 842690 9f9ca89c3d3ba7c46481e9cd39c242a6\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_ia64.deb\n Size/MD5 checksum: 962854 c8a32f808d719357a5b6350e2b60794e\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mips.deb\n Size/MD5 checksum: 895414 5dd919d188291cb3727d39b5e06c9e26\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mips.deb\n Size/MD5 checksum: 927342 28c245db4d8ea82ba4075b27d674d72a\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mips.deb\n Size/MD5 checksum: 833182 0e0b21e13d77de82bed7a38d30f65e4b\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mips.deb\n Size/MD5 checksum: 1769524 24bdc73a3d20c4046c7741957442c713\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mips.deb\n Size/MD5 checksum: 1717562 977ae5c34a127d32d8f2bf222de9a431\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mipsel.deb\n Size/MD5 checksum: 1755032 cab5c112911465a9ce23a0d2ea44ded9\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mipsel.deb\n Size/MD5 checksum: 926616 2bf14a3fe74d9f2a523aacc8b04f5282\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mipsel.deb\n Size/MD5 checksum: 895194 b7c9ed37bf83ad92371f5472ac5d917b\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mipsel.deb\n Size/MD5 checksum: 833098 08b63ba6c3becf25ba2f941a532a7b71\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mipsel.deb\n Size/MD5 checksum: 1720642 1ff7568eb478edee923edb76cf42e9ac\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_powerpc.deb\n Size/MD5 checksum: 941434 bbac9384bd7f88339e2b86fa665208c1\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_powerpc.deb\n Size/MD5 checksum: 835212 4790d79f8de7f1bee7aabf0473f25268\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_powerpc.deb\n Size/MD5 checksum: 1657890 b91fcf52e80c7196cea0c13df9ac79ef\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_powerpc.deb\n Size/MD5 checksum: 1803262 4d298c9509941390c7b2eb68320ad211\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_powerpc.deb\n Size/MD5 checksum: 928170 b17966a6a61313344ac827b58f32eeef\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_s390.deb\n Size/MD5 checksum: 1409718 2a128cbdce2522ef49604255cff41af2\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_s390.deb\n Size/MD5 checksum: 931452 d3bb7c3a849cd2b35fa6e4acb19c318d\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_s390.deb\n Size/MD5 checksum: 1834914 67e5b946df18b06b41b3e108d5ddc4e3\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_s390.deb\n Size/MD5 checksum: 836102 7a4b85e8ea0e50d7213997b5f7d6309f\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_s390.deb\n Size/MD5 checksum: 903864 3f80e78e4e2672aacf3da0690ff24b79\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_sparc.deb\n Size/MD5 checksum: 925336 5824ea607689f3f1bd62a9e6e28f95ae\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_sparc.deb\n Size/MD5 checksum: 1548630 1378d1cf730d3026bc1f01a4ab2ccedb\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_sparc.deb\n Size/MD5 checksum: 918592 28a086f6aa2ee8d510b38c1a177843fc\n http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_sparc.deb\n Size/MD5 checksum: 834186 068cbf2b4774ecf9504b820db26e6f1d\n http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_sparc.deb\n Size/MD5 checksum: 1782014 d39fae5fe0d1397a2a1bd7397d6e850a\n\n\n These files will probably be moved into the stable distribution on\n its next update. ===========================================================\nUbuntu Security Notice USN-685-1 December 03, 2008\nnet-snmp vulnerabilities\nCVE-2008-0960, CVE-2008-2292, CVE-2008-4309\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 7.10\nUbuntu 8.04 LTS\nUbuntu 8.10\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n libsnmp-perl 5.2.1.2-4ubuntu2.3\n libsnmp9 5.2.1.2-4ubuntu2.3\n\nUbuntu 7.10:\n libsnmp-perl 5.3.1-6ubuntu2.2\n libsnmp10 5.3.1-6ubuntu2.2\n\nUbuntu 8.04 LTS:\n libsnmp-perl 5.4.1~dfsg-4ubuntu4.2\n libsnmp15 5.4.1~dfsg-4ubuntu4.2\n\nUbuntu 8.10:\n libsnmp15 5.4.1~dfsg-7.1ubuntu6.1\n\nIn general, a standard system upgrade is sufficient to effect the\nnecessary changes. \n\nDetails follow:\n\nWes Hardaker discovered that the SNMP service did not correctly validate\nHMAC authentication requests. (CVE-2008-0960)\n\nJohn Kortink discovered that the Net-SNMP Perl module did not correctly\ncheck the size of returned values. If a user or automated system were\ntricked into querying a malicious SNMP server, the application using\nthe Perl module could be made to crash, leading to a denial of service. \nThis did not affect Ubuntu 8.10. (CVE-2008-2292)\n\nIt was discovered that the SNMP service did not correctly handle large\nGETBULK requests. (CVE-2008-4309)\n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.diff.gz\n Size/MD5: 75402 9655d984a47cec8e27efa4db0b227870\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.dsc\n Size/MD5: 838 17a17230a005c1acfd0569757e728fad\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2.orig.tar.gz\n Size/MD5: 3869893 34159770a7fe418d99fdd416a75358b1\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.2.1.2-4ubuntu2.3_all.deb\n Size/MD5: 1152306 f7647cee4df8db87ab48c0d05635a973\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.2.1.2-4ubuntu2.3_all.deb\n Size/MD5: 822946 b9b852c188937d1fffc06d4da01325d5\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_amd64.deb\n Size/MD5: 896620 a78012b3f0f13667081f97dc1a4d62e8\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_amd64.deb\n Size/MD5: 1497194 7d55b8d1e4ae0c45753bedcf536a1a5a\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_amd64.deb\n Size/MD5: 1826252 0550c1401f9bbe5f345fd96484ed369c\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_amd64.deb\n Size/MD5: 889330 5ad0ddb2c610973166e4dd07769ba3d3\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_amd64.deb\n Size/MD5: 797086 18cf4210342b683d3ee24fe995329b55\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_i386.deb\n Size/MD5: 896880 298d27ea1ece6e80bb8931b9a5e61961\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_i386.deb\n Size/MD5: 1268472 acbca43ab7ea747fa3e4636d15ef997c\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_i386.deb\n Size/MD5: 1710342 bd27290685bcf1d6a23eb8705d3367e7\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_i386.deb\n Size/MD5: 881838 58121bd9e4c845da7df4e540645e0e13\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_i386.deb\n Size/MD5: 794672 221d1c554bd89f50dc3ac9108a6cef6b\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_powerpc.deb\n Size/MD5: 913064 45a033b01c4b31ef90a92988bb5fb229\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_powerpc.deb\n Size/MD5: 1590124 b62aa5477d9307d311c811298b7ec3d9\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_powerpc.deb\n Size/MD5: 1728094 5214ce9aebe3a8d7a28a1746a81ce8ea\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_powerpc.deb\n Size/MD5: 898580 86e6c1b5dfb5bf91f63d7c6786b7abae\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_powerpc.deb\n Size/MD5: 796092 1bab28407224f782b2c3ae04b4647333\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_sparc.deb\n Size/MD5: 896832 3d233db9682d5654fdad6bc6b5a649ba\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_sparc.deb\n Size/MD5: 1485268 064304ead0ca4653136376e8e9039e74\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_sparc.deb\n Size/MD5: 1706490 cb76027eb8167e0866a81b93a4da28ed\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_sparc.deb\n Size/MD5: 883182 d1ffc12427d92be51efdba3349e74f9a\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_sparc.deb\n Size/MD5: 796374 0f3f749ebe4af6111fe49316639004e4\n\nUpdated packages for Ubuntu 7.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.diff.gz\n Size/MD5: 94646 8b6f9380d9f8c5514a1d4db729c6df04\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.dsc\n Size/MD5: 1287 f53866efd3ae4f3c939a77b1005e1f11\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1.orig.tar.gz\n Size/MD5: 4210843 360a9783dbc853bab6bda90d961daee5\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.3.1-6ubuntu2.2_all.deb\n Size/MD5: 484306 f2d03276d1cdcef7e8b276ad8ca9595d\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.3.1-6ubuntu2.2_all.deb\n Size/MD5: 901284 6889b371d4de92eb61bf83b89d8a8c37\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_amd64.deb\n Size/MD5: 2541692 1e6de4bd3c3baa444a2e1980a593a40e\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_amd64.deb\n Size/MD5: 968940 7efe4bdcb99f311f1c4bb2c3b9d24a4e\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_amd64.deb\n Size/MD5: 1200930 821861c24499cfdfa2a82c329c610c16\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_amd64.deb\n Size/MD5: 996572 00cc1a4c8c7924124984e666563e73d0\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_amd64.deb\n Size/MD5: 908792 a40763280a3bdbe60eca5e07c5d6c30c\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_i386.deb\n Size/MD5: 2321524 59d44616802197e1227cf88abddefe36\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_i386.deb\n Size/MD5: 967106 a6e5b308d889bdf6f5abe454e35ba474\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_i386.deb\n Size/MD5: 1124462 ec99daa26d0fafba6e9f0b874a23bf3d\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_i386.deb\n Size/MD5: 991956 cb20b6a4d68a858ffa0846431169d411\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_i386.deb\n Size/MD5: 907546 1ab5119e23a16e99203c113d49fc2723\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_lpia.deb\n Size/MD5: 2305548 da57690a3327196e0c3684735be23f2e\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_lpia.deb\n Size/MD5: 968984 8da336a5fd871be10e6b8d66d3b9c9d3\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_lpia.deb\n Size/MD5: 1074500 e4d6690a6a6a543fc0244a29cd350c9b\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_lpia.deb\n Size/MD5: 989566 2d2f4b1662e6a2dffafe8e98f00a15e7\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_lpia.deb\n Size/MD5: 907596 4274e006754ebc836132166e0f0429a0\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_powerpc.deb\n Size/MD5: 2641202 9b2ec56463ee715752b780aa332d8cd0\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_powerpc.deb\n Size/MD5: 985722 a2fca8426b7b51e98c39b91a468bf71f\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_powerpc.deb\n Size/MD5: 1154496 6073239f7ffead2a5b9c3357ada1602c\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_powerpc.deb\n Size/MD5: 1018596 af12cc55597a0d2d3a92b4b5d683bb14\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_powerpc.deb\n Size/MD5: 911866 57e2246930e712bdc1b039840d43af48\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_sparc.deb\n Size/MD5: 2527568 19b1a0971259a9b99f9c0386f5935bfc\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_sparc.deb\n Size/MD5: 970264 d8ae7f0bb10375ad487b14ba031cd013\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_sparc.deb\n Size/MD5: 1078842 2401fc4c40352b8c8013e8c5de3b0ecd\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_sparc.deb\n Size/MD5: 995228 16b230d3c718d8eb4a023126bd09d7f5\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_sparc.deb\n Size/MD5: 908708 1e410a8ddac41ad9faec901c5a638f29\n\nUpdated packages for Ubuntu 8.04 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.diff.gz\n Size/MD5: 78642 b4acf50e47be498e579b934f32081d25\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.dsc\n Size/MD5: 1447 0abcea5df87851df2aae7ebd1fc00e7a\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz\n Size/MD5: 4618308 0ef987c41d3414f2048c94d187a2baeb\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-4ubuntu4.2_all.deb\n Size/MD5: 526864 f3a131bf5a4f5c547573430cb66d410c\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-4ubuntu4.2_all.deb\n Size/MD5: 102072 2f276f50efdb7e34f7e61f132f7f7cd7\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 1796950 283c5a95206ab74062e0e30eba4e0890\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 142522 9fff294368a7eac39e37fa478ac6609d\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 1296694 d0646a1543c51f14a93b40f972bc1569\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 163178 0378a25e3b2a0bc80ddb8ec720b5557d\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 75960 fcba461f2e2376cad515329791e04a17\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n Size/MD5: 38512 21d9ecbc86a8e5965047d027e94fd324\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 1556806 39e4f63b841c4b36c022017d66c12f58\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 179478 5f08596ae997792920e238ff8cd2a7ba\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 1098794 38bc61a5b403fb4f626a641a5f13e681\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 157954 66e38c37639f3c68e7e4a933fa953ff3\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 74116 50b3a4d0cfd38585d2711d30cf725e9d\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_i386.deb\n Size/MD5: 75038 98cdeec4b1014568b00107a82fc74418\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 1552018 d9dcab084f3b9bf3e8c36cb5db8f141e\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 141508 96061180809cccc975e0d7079e07ed3e\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 1171530 2d91048fe0a2ac9e3a4fddb84c67513e\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 155564 c67ba3aeb2535ee3e7fc4c89e90ba36a\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 74274 db05202893f516398bbe4e2153ef2d6e\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n Size/MD5: 35552 a75caf212ffb5a0eafe4ba2656c9aae1\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 1874428 0ed8b5f4e6bad74d506d73447de00bd2\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 158374 dfcd7c4455b4bbd3f746368058d09a59\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 1238226 b5b3a81e956cdb14674d571694d1b6d0\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 185314 5e9d8bd56493f75ae8a8691c530aa420\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 83106 75dea32ec7152b7868fabf09d9d5a198\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n Size/MD5: 42928 214fe703fced2e387b48b51dcbb1d6b7\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 1760062 ade4c08289d947d092a5b2ab06517cc7\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 143860 62b7260d618531b0ed5e7871ab7b99a9\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 1159702 28ea81660bbdd9d7982be58d225e8814\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 160236 196e493ce73905446a3764e73b99f332\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 75518 f24e4b0e3e4a7d97c28da99cdc0a47a5\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n Size/MD5: 38240 873f5e820e381ec2254ed520bcd09af0\n\nUpdated packages for Ubuntu 8.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.diff.gz\n Size/MD5: 82260 85fb58aa81933f142bd937bca2e18341\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.dsc\n Size/MD5: 1956 1ee06f6b731eae435af6a2d438ef909b\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz\n Size/MD5: 4618308 0ef987c41d3414f2048c94d187a2baeb\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-7.1ubuntu6.1_all.deb\n Size/MD5: 527650 9c56f3d70018b714895a61c0daba9498\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-7.1ubuntu6.1_all.deb\n Size/MD5: 103060 108eb50387ca46b4ee38ebb8722ced88\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 1815638 82385081fe2d4eeb1a6c94f9dae672ad\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 146154 1b6249e02e89213f2f4d2aa9c9123420\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 1315628 8443e091f2c63485a422236ad23e55cd\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 165522 154a05824b98e041ceac60ac83709ef4\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 77914 8d6e328f309e78bf1fcf21c2633d82ec\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n Size/MD5: 39930 6b7a1a67ca63b5c843ce66f3547b3c89\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 1569568 dd0599b150eccee9889325d17a7b0769\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 184264 52a54aebef81648164a5bc90f27b0cc5\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 1119072 10c81fe283b25e7ad31fcfd88a2325f0\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 156112 6296f0836bc9797ff48810c79965c3a5\n http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 74476 bd96a6915eb97fed083aac4daa5f07cf\n http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n Size/MD5: 77652 3e30e51c362dfa982a3b3197be081328\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 1557614 065f4575c7a2d257fa6b5b9d0cee454f\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 144292 b55f2c4aff8a86499d7f38fd6e773f44\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 1184272 84116fefdce279ce338ffc9614384c06\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 154444 ffe9e765a01695355bdb58008a2910f5\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 73746 762e75672fbd395d2d159513f5d572b0\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n Size/MD5: 36530 0a98b51b94a5f75d4131d657aa766579\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 1884632 a3ad023841ee605efa1e055712b44d9a\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 161074 5586adea8200d2d5bf81f288b5bf7be2\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 1249636 48ec688499fea1dc0ccb3091c0158fb8\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 181952 8ef5f6b9b6c6b8e4fcd5cb37147304a2\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 81802 965218126fb5a49cfcd9e20afeb49782\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n Size/MD5: 43048 09f2f9ed9f519ca5723411802e46d48b\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 1759316 46455cc355c1b808243eada0f134d00b\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 145164 2cdb5b35db853c7c184a44022fc23cd8\n http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 1159834 cfff424e5bff38bb3ef9419f03465388\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 163042 354f7a5423a34c411c5f8620c66d3e58\n http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 76994 ca11bcf9a411f618e35e1d6b6ab8c8f9\n http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n Size/MD5: 38526 172493ec5df1866e2633e074c7f38775\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-4309" }, { "db": "JVNDB", "id": "JVNDB-2008-001912" }, { "db": "BID", "id": "32020" }, { "db": "VULMON", "id": "CVE-2008-4309" }, { "db": "PACKETSTORM", "id": "74204" }, { "db": "PACKETSTORM", "id": "74528" }, { "db": "PACKETSTORM", "id": "71612" }, { "db": "PACKETSTORM", "id": "80339" }, { "db": "PACKETSTORM", "id": "71748" }, { "db": "PACKETSTORM", "id": "72606" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-4309", "trust": 3.4 }, { "db": "BID", "id": "32020", "trust": 2.8 }, { "db": "SECUNIA", "id": "32560", "trust": 2.5 }, { "db": "SECUNIA", "id": "35679", "trust": 1.7 }, { "db": "SECUNIA", "id": "33821", "trust": 1.7 }, { "db": "SECUNIA", "id": "33003", "trust": 1.7 }, { "db": "SECUNIA", "id": "32711", "trust": 1.7 }, { "db": "SECUNIA", "id": "32539", "trust": 1.7 }, { "db": "SECUNIA", "id": "33746", "trust": 1.7 }, { "db": "SECUNIA", "id": "33631", "trust": 1.7 }, { "db": "SECUNIA", "id": "33095", "trust": 1.7 }, { "db": "SECUNIA", "id": "35074", "trust": 1.7 }, { "db": "SECUNIA", "id": "32664", "trust": 1.7 }, { "db": "USCERT", "id": "TA09-133A", "trust": 1.7 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2008/10/31/1", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2009-1771", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2008-3400", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2008-2973", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2009-1297", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2009-0301", "trust": 1.6 }, { "db": "SECTRACK", "id": "1021129", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2008-001912", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2020.0096", "trust": 0.6 }, { "db": "JUNIPER", "id": "JSA10991", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200810-516", "trust": 0.6 }, { "db": "VUPEN", "id": "2009/0301", "trust": 0.1 }, { "db": "VUPEN", "id": "2008/2973", "trust": 0.1 }, { "db": "VUPEN", "id": "2009/1771", "trust": 0.1 }, { "db": "VUPEN", "id": "2008/3400", "trust": 0.1 }, { "db": "VUPEN", "id": "2009/1297", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2008-4309", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "74204", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "74528", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "71612", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "80339", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "71748", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "72606", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2008-4309" }, { "db": "BID", "id": "32020" }, { "db": "JVNDB", "id": "JVNDB-2008-001912" }, { "db": "PACKETSTORM", "id": "74204" }, { "db": "PACKETSTORM", "id": "74528" }, { "db": "PACKETSTORM", "id": "71612" }, { "db": "PACKETSTORM", "id": "80339" }, { "db": "PACKETSTORM", "id": "71748" }, { "db": "PACKETSTORM", "id": "72606" }, { "db": "CNNVD", "id": "CNNVD-200810-516" }, { "db": "NVD", "id": "CVE-2008-4309" } ] }, "id": "VAR-200810-0643", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.393692325 }, "last_update_date": "2024-11-29T22:11:18.878000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT4298", "trust": 0.8, "url": "http://support.apple.com/kb/HT4298" }, { "title": "HT3549", "trust": 0.8, "url": "http://support.apple.com/kb/HT3549" }, { "title": "HT4298", "trust": 0.8, "url": "http://support.apple.com/kb/HT4298?viewlocale=ja_JP" }, { "title": "HT3549", "trust": 0.8, "url": "http://support.apple.com/kb/HT3549?viewlocale=ja_JP" }, { "title": "net-snmp-5.3.1-24.2", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=370" }, { "title": "1364", "trust": 0.8, "url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=1364" }, { "title": "882903", "trust": 0.8, "url": "http://sourceforge.net/forum/forum.php?forum_id=882903" }, { "title": "17272", "trust": 0.8, "url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev\u0026revision=17272" }, { "title": "RHSA-2008:0971", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2008-0971.html" }, { "title": "262908", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-262908-1" }, { "title": "RHSA-2008:0971", "trust": 0.8, "url": "https://www.jp.redhat.com/support/errata/RHSA/RHSA-2008-0971J.html" }, { "title": "AirPortUtility552", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=34018" }, { "title": "AirPortSetup", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=34017" }, { "title": "Red Hat: Important: net-snmp security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20080971 - Security Advisory" }, { "title": "Debian CVElist Bug Report Logs: snmpd: DoS in getbulk handling code in net-snmp", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=62361f00053b31a6e287f8cdbab522bc" }, { "title": "Debian CVElist Bug Report Logs: CVE-2008-6123: Access restriction bypass", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=3c8a3056506c3b0fcd60cc70f0ff94c5" }, { "title": "Ubuntu Security Notice: net-snmp vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-685-1" }, { "title": "Debian Security Advisories: DSA-1663-1 net-snmp -- several vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=61d231c8116737565b9155223d52d04c" }, { "title": "VMware Security Advisories: VMSA-2010-0003.1 ESX Service Console update for net-snmp", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=118460cedfd75dcd7f03f597c97a9f86" }, { "title": "VMware Security Advisories: ESX patches address an issue loading corrupt virtual disks and update Service Console packages", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=7061f6121847e751e6c7d427a8dcc3e9" } ], "sources": [ { "db": "VULMON", "id": "CVE-2008-4309" }, { "db": "JVNDB", "id": "JVNDB-2008-001912" }, { "db": "CNNVD", "id": "CNNVD-200810-516" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001912" }, { "db": "NVD", "id": "CVE-2008-4309" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://www.securityfocus.com/bid/32020" }, { "trust": 2.5, "url": "http://secunia.com/advisories/32560" }, { "trust": 2.0, "url": "http://sourceforge.net/forum/forum.php?forum_id=882903" }, { "trust": 2.0, "url": "http://support.avaya.com/elmodocs2/security/asa-2008-467.htm" }, { "trust": 1.8, "url": "http://security.gentoo.org/glsa/glsa-200901-15.xml" }, { "trust": 1.7, "url": "http://www.openwall.com/lists/oss-security/2008/10/31/1" }, { "trust": 1.7, "url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272" }, { "trust": 1.7, "url": "http://www.debian.org/security/2008/dsa-1663" }, { "trust": 1.7, "url": "http://secunia.com/advisories/32711" }, { "trust": 1.7, "url": "http://wiki.rpath.com/wiki/advisories:rpsa-2008-0315" }, { "trust": 1.7, "url": "http://secunia.com/advisories/32664" }, { "trust": 1.7, "url": "http://secunia.com/advisories/33631" }, { "trust": 1.7, "url": "http://www.vmware.com/security/advisories/vmsa-2009-0001.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2008-0971.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html" }, { "trust": 1.7, "url": "http://secunia.com/advisories/33821" }, { "trust": 1.7, "url": "http://secunia.com/advisories/32539" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1021129" }, { "trust": 1.7, "url": "http://secunia.com/advisories/33095" }, { "trust": 1.7, "url": "http://secunia.com/advisories/33003" }, { "trust": 1.7, "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "trust": 1.7, "url": "http://secunia.com/advisories/33746" }, { "trust": 1.7, "url": "http://www.us-cert.gov/cas/techalerts/ta09-133a.html" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "trust": 1.7, "url": "http://support.apple.com/kb/ht3549" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2009/may/msg00002.html" }, { "trust": 1.7, "url": "http://secunia.com/advisories/35074" }, { "trust": 1.7, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1" }, { "trust": 1.7, "url": "http://secunia.com/advisories/35679" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2009/1771" }, { "trust": 1.7, "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2010//dec/msg00001.html" }, { "trust": 1.7, "url": "http://support.apple.com/kb/ht4298" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2009/0301" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2008/3400" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2008/2973" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2008:225" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46262" }, { "trust": 1.7, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9860" }, { "trust": 1.7, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6353" }, { "trust": 1.7, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6171" }, { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/498280/100/0/threaded" }, { "trust": 1.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4309" }, { "trust": 0.8, "url": "http://www.frsirt.com/english/advisories/2008/2973" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu545319" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4309" }, { "trust": 0.7, "url": "https://access.redhat.com/errata/rhsa-2008:0971" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-4309" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2008-4309" }, { "trust": 0.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=469349" }, { "trust": 0.6, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10991" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0096/" }, { "trust": 0.3, "url": "http://h18006.www1.hp.com/products/servers/management/insightcontrol_linux2/index.html" }, { "trust": 0.3, "url": "http://net-snmp.sourceforge.net/" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-262908-1" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0960" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-2292" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/685-1/" }, { "trust": 0.1, "url": "http://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://download3.vmware.com/software/vi/esx350-200901409-sg.zip" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1006659" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1006660" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-4226" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1006661" }, { "trust": 0.1, "url": "http://download3.vmware.com/software/vi/esx-1007674.tgz" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-4225" }, { "trust": 0.1, "url": "http://www.vmware.com/security" }, { "trust": 0.1, "url": "http://download3.vmware.com/software/vi/esx303-200901406-sg.zip" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-4914" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1007673" }, { "trust": 0.1, "url": "http://download3.vmware.com/software/vi/esxe350-200901401-o-sg.zip" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1055" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1007682" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://download3.vmware.com/software/vi/esx303-200901405-sg.zip" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4225" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4226" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1006651" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/eos.html" }, { "trust": 0.1, "url": "http://download3.vmware.com/software/vi/esx350-200901401-sg.zip" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1007681" }, { "trust": 0.1, "url": "http://download3.vmware.com/software/vi/esx-1007673.tgz" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4914" }, { "trust": 0.1, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.1, "url": "http://download3.vmware.com/software/vi/esx350-200901410-sg.zip" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/eos_vi.html" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1007674" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://www.hp.com/go/ice-lx" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2677" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1720" }, { "trust": 0.1, "url": "http://www.itrc.hp.com/service/cki/secbullarchive.do" }, { "trust": 0.1, "url": "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na\u0026langcode=useng\u0026jumpid=in_sc-gen__driveritrc\u0026topiccode=itrc" }, { "trust": 0.1, "url": "https://h20392.www2.hp.com/portal/swdepot/try.do?productnumber=hpicelx" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-5161" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-1272" }, { "trust": 0.1, "url": "http://h30046.www3.hp.com/subsignin.php" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0590" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_hppa.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3-7etch4.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-base_5.2.3-7etch4_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/net-snmp_5.2.3.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mips.deb" }, { "trust": 0.1, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.1, "url": "http://security.debian.org/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_mipsel.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9-dev_5.2.3-7etch4_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmpd_5.2.3-7etch4_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/snmp_5.2.3-7etch4_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/tkmib_5.2.3-7etch4_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp-perl_5.2.3-7etch4_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/n/net-snmp/libsnmp9_5.2.3-7etch4_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-7.1ubuntu6.1_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.3.1-6ubuntu2.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2.orig.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.2.1.2-4ubuntu2.3_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-7.1ubuntu6.1_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.3.1-6ubuntu2.2_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-4ubuntu4.2_all.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_i386.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_amd64.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.2.1.2-4ubuntu2.3_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.diff.gz" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_powerpc.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-4ubuntu4.2_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_i386.deb" } ], "sources": [ { "db": "VULMON", "id": "CVE-2008-4309" }, { "db": "BID", "id": "32020" }, { "db": "JVNDB", "id": "JVNDB-2008-001912" }, { "db": "PACKETSTORM", "id": "74204" }, { "db": "PACKETSTORM", "id": "74528" }, { "db": "PACKETSTORM", "id": "71612" }, { "db": "PACKETSTORM", "id": "80339" }, { "db": "PACKETSTORM", "id": "71748" }, { "db": "PACKETSTORM", "id": "72606" }, { "db": "CNNVD", "id": "CNNVD-200810-516" }, { "db": "NVD", "id": "CVE-2008-4309" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2008-4309" }, { "db": "BID", "id": "32020" }, { "db": "JVNDB", "id": "JVNDB-2008-001912" }, { "db": "PACKETSTORM", "id": "74204" }, { "db": "PACKETSTORM", "id": "74528" }, { "db": "PACKETSTORM", "id": "71612" }, { "db": "PACKETSTORM", "id": "80339" }, { "db": "PACKETSTORM", "id": "71748" }, { "db": "PACKETSTORM", "id": "72606" }, { "db": "CNNVD", "id": "CNNVD-200810-516" }, { "db": "NVD", "id": "CVE-2008-4309" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-10-31T00:00:00", "db": "VULMON", "id": "CVE-2008-4309" }, { "date": "2008-10-31T00:00:00", "db": "BID", "id": "32020" }, { "date": "2008-12-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001912" }, { "date": "2009-01-21T22:37:48", "db": "PACKETSTORM", "id": "74204" }, { "date": "2009-02-01T19:57:26", "db": "PACKETSTORM", "id": "74528" }, { "date": "2008-11-06T00:23:18", "db": "PACKETSTORM", "id": "71612" }, { "date": "2009-08-15T00:45:19", "db": "PACKETSTORM", "id": "80339" }, { "date": "2008-11-09T21:15:50", "db": "PACKETSTORM", "id": "71748" }, { "date": "2008-12-04T02:50:13", "db": "PACKETSTORM", "id": "72606" }, { "date": "2008-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200810-516" }, { "date": "2008-10-31T20:29:09.497000", "db": "NVD", "id": "CVE-2008-4309" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-11T00:00:00", "db": "VULMON", "id": "CVE-2008-4309" }, { "date": "2015-04-13T21:33:00", "db": "BID", "id": "32020" }, { "date": "2011-01-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001912" }, { "date": "2023-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200810-516" }, { "date": "2024-11-21T00:51:21.590000", "db": "NVD", "id": "CVE-2008-4309" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "71612" }, { "db": "PACKETSTORM", "id": "80339" }, { "db": "PACKETSTORM", "id": "71748" }, { "db": "PACKETSTORM", "id": "72606" }, { "db": "CNNVD", "id": "CNNVD-200810-516" } ], "trust": 1.0 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "net-snmp of netsnmp_create_subtree_cache Integer overflow vulnerability in functions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001912" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "32020" }, { "db": "CNNVD", "id": "CNNVD-200810-516" } ], "trust": 0.9 } }
gsd-2008-4309
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2008-4309", "description": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.", "id": "GSD-2008-4309", "references": [ "https://www.suse.com/security/cve/CVE-2008-4309.html", "https://www.debian.org/security/2008/dsa-1663", "https://access.redhat.com/errata/RHSA-2008:0971", "https://linux.oracle.com/cve/CVE-2008-4309.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2008-4309" ], "details": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.", "id": "GSD-2008-4309", "modified": "2023-12-13T01:22:59.689703Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-4309", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html" }, { "name": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "name": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272", "refsource": "MISC", "url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272" }, { "name": "http://secunia.com/advisories/32539", "refsource": "MISC", "url": "http://secunia.com/advisories/32539" }, { "name": "http://secunia.com/advisories/32560", "refsource": "MISC", "url": "http://secunia.com/advisories/32560" }, { "name": "http://secunia.com/advisories/32664", "refsource": "MISC", "url": "http://secunia.com/advisories/32664" }, { "name": "http://secunia.com/advisories/32711", "refsource": "MISC", "url": "http://secunia.com/advisories/32711" }, { "name": "http://secunia.com/advisories/33003", "refsource": "MISC", "url": "http://secunia.com/advisories/33003" }, { "name": "http://secunia.com/advisories/33095", "refsource": "MISC", "url": "http://secunia.com/advisories/33095" }, { "name": "http://secunia.com/advisories/33631", "refsource": "MISC", "url": "http://secunia.com/advisories/33631" }, { "name": "http://secunia.com/advisories/33746", "refsource": "MISC", "url": "http://secunia.com/advisories/33746" }, { "name": "http://secunia.com/advisories/33821", "refsource": "MISC", "url": "http://secunia.com/advisories/33821" }, { "name": "http://secunia.com/advisories/35074", "refsource": "MISC", "url": "http://secunia.com/advisories/35074" }, { "name": "http://secunia.com/advisories/35679", "refsource": "MISC", "url": "http://secunia.com/advisories/35679" }, { "name": "http://security.gentoo.org/glsa/glsa-200901-15.xml", "refsource": "MISC", "url": "http://security.gentoo.org/glsa/glsa-200901-15.xml" }, { "name": "http://sourceforge.net/forum/forum.php?forum_id=882903", "refsource": "MISC", "url": "http://sourceforge.net/forum/forum.php?forum_id=882903" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1", "refsource": "MISC", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1" }, { "name": "http://support.apple.com/kb/HT3549", "refsource": "MISC", "url": "http://support.apple.com/kb/HT3549" }, { "name": "http://support.apple.com/kb/HT4298", "refsource": "MISC", "url": "http://support.apple.com/kb/HT4298" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm", "refsource": "MISC", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315", "refsource": "MISC", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315" }, { "name": "http://www.debian.org/security/2008/dsa-1663", "refsource": "MISC", "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:225", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:225" }, { "name": "http://www.openwall.com/lists/oss-security/2008/10/31/1", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2008/10/31/1" }, { "name": "http://www.redhat.com/support/errata/RHSA-2008-0971.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2008-0971.html" }, { "name": "http://www.securityfocus.com/archive/1/498280/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/498280/100/0/threaded" }, { "name": "http://www.securityfocus.com/bid/32020", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/32020" }, { "name": "http://www.securitytracker.com/id?1021129", "refsource": "MISC", "url": "http://www.securitytracker.com/id?1021129" }, { "name": "http://www.ubuntu.com/usn/usn-685-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "name": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html", "refsource": "MISC", "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0001.html", "refsource": "MISC", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0001.html" }, { "name": "http://www.vupen.com/english/advisories/2008/2973", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2008/2973" }, { "name": "http://www.vupen.com/english/advisories/2008/3400", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2008/3400" }, { "name": "http://www.vupen.com/english/advisories/2009/0301", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2009/0301" }, { "name": "http://www.vupen.com/english/advisories/2009/1297", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "http://www.vupen.com/english/advisories/2009/1771", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2009/1771" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46262", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46262" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353" }, { "name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860", "refsource": "MISC", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:net-snmp:net-snmp:5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:net-snmp:net-snmp:5.3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:net-snmp:net-snmp:5.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2008-4309" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20081031 New net-snmp DoS", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2008/10/31/1" }, { "name": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272" }, { "name": "http://sourceforge.net/forum/forum.php?forum_id=882903", "refsource": "CONFIRM", "tags": [], "url": "http://sourceforge.net/forum/forum.php?forum_id=882903" }, { "name": "32020", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/32020" }, { "name": "DSA-1663", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "32711", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/32711" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315", "refsource": "CONFIRM", "tags": [], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315" }, { "name": "32664", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/32664" }, { "name": "33631", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/33631" }, { "name": "GLSA-200901-15", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200901-15.xml" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0001.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0001.html" }, { "name": "RHSA-2008:0971", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0971.html" }, { "name": "32560", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/32560" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm" }, { "name": "SUSE-SR:2009:003", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html" }, { "name": "33821", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/33821" }, { "name": "32539", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/32539" }, { "name": "1021129", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1021129" }, { "name": "33095", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/33095" }, { "name": "33003", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/33003" }, { "name": "USN-685-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "name": "33746", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/33746" }, { "name": "TA09-133A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "ADV-2009-1297", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "http://support.apple.com/kb/HT3549", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/kb/HT3549" }, { "name": "APPLE-SA-2009-05-12", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "35074", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35074" }, { "name": "262908", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1" }, { "name": "35679", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/35679" }, { "name": "ADV-2009-1771", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2009/1771" }, { "name": "HPSBMA02447", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "name": "APPLE-SA-2010-12-16-1", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html" }, { "name": "http://support.apple.com/kb/HT4298", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/kb/HT4298" }, { "name": "ADV-2009-0301", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2009/0301" }, { "name": "ADV-2008-3400", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/3400" }, { "name": "ADV-2008-2973", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/2973" }, { "name": "MDVSA-2008:225", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:225" }, { "name": "netsnmp-netsnmpcreatesubtreecache-dos(46262)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46262" }, { "name": "oval:org.mitre.oval:def:9860", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860" }, { "name": "oval:org.mitre.oval:def:6353", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353" }, { "name": "oval:org.mitre.oval:def:6171", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171" }, { "name": "20081112 rPSA-2008-0315-1 net-snmp net-snmp-client net-snmp-server net-snmp-utils", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/498280/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T02:19Z", "publishedDate": "2008-10-31T20:29Z" } } }
rhsa-2008_0971
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated net-snmp packages that fix a security issue are now available for\nRed Hat Enterprise Linux 3, 4, and 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Simple Network Management Protocol (SNMP) is a protocol used for\nnetwork management.\n\nA denial-of-service flaw was found in the way Net-SNMP processes SNMP\nGETBULK requests. A remote attacker who issued a specially-crafted request\ncould cause the snmpd server to crash. (CVE-2008-4309)\n\nNote: An attacker must have read access to the SNMP server in order to\nexploit this flaw. In the default configuration, the community name\n\"public\" grants read-only access. In production deployments, it is\nrecommended to change this default community name.\n\nAll users of net-snmp should upgrade to these updated packages, which\ncontain a backported patch to resolve this issue.\n", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0971", "url": "https://access.redhat.com/errata/RHSA-2008:0971" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "469349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=469349" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0971.json" } ], "title": "Red Hat Security Advisory: net-snmp security update", "tracking": { "current_release_date": "2024-11-22T02:20:47+00:00", "generator": { "date": "2024-11-22T02:20:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0971", "initial_release_date": "2008-11-03T14:53:00+00:00", "revision_history": [ { "date": "2008-11-03T14:53:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-11-03T10:23:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:20:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "net-snmp-utils-0:5.0.9-2.30E.25.ia64", "product": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.ia64", "product_id": "net-snmp-utils-0:5.0.9-2.30E.25.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.25?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.0.9-2.30E.25.ia64", "product": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.ia64", "product_id": "net-snmp-devel-0:5.0.9-2.30E.25.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.25?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-0:5.0.9-2.30E.25.ia64", "product": { "name": "net-snmp-0:5.0.9-2.30E.25.ia64", "product_id": "net-snmp-0:5.0.9-2.30E.25.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.25?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64", "product": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64", "product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.25?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.0.9-2.30E.25.ia64", "product": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.ia64", "product_id": "net-snmp-perl-0:5.0.9-2.30E.25.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.25?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.0.9-2.30E.25.ia64", "product": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.ia64", "product_id": "net-snmp-libs-0:5.0.9-2.30E.25.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.25?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64", "product": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64", "product_id": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-13.el4_7.2?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64", "product": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64", "product_id": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-13.el4_7.2?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-0:5.1.2-13.el4_7.2.ia64", "product": { "name": "net-snmp-0:5.1.2-13.el4_7.2.ia64", "product_id": "net-snmp-0:5.1.2-13.el4_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.1.2-13.el4_7.2?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64", "product": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64", "product_id": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-13.el4_7.2?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64", "product": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64", "product_id": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-13.el4_7.2?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64", "product": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64", "product_id": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-13.el4_7.2?arch=ia64" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64", "product": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64", "product_id": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.2?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64", "product": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64", "product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.2?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64", "product": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64", "product_id": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.2?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64", "product": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64", "product_id": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.2?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-1:5.3.1-24.el5_2.2.ia64", "product": { "name": "net-snmp-1:5.3.1-24.el5_2.2.ia64", "product_id": "net-snmp-1:5.3.1-24.el5_2.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.2?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64", "product": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64", "product_id": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.2?arch=ia64\u0026epoch=1" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386", "product": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386", "product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.25?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.0.9-2.30E.25.i386", "product": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.i386", "product_id": "net-snmp-libs-0:5.0.9-2.30E.25.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.25?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.0.9-2.30E.25.i386", "product": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.i386", "product_id": "net-snmp-utils-0:5.0.9-2.30E.25.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.25?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.0.9-2.30E.25.i386", "product": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.i386", "product_id": "net-snmp-devel-0:5.0.9-2.30E.25.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.25?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-0:5.0.9-2.30E.25.i386", "product": { "name": "net-snmp-0:5.0.9-2.30E.25.i386", "product_id": "net-snmp-0:5.0.9-2.30E.25.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.25?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.0.9-2.30E.25.i386", "product": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.i386", "product_id": "net-snmp-perl-0:5.0.9-2.30E.25.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.25?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386", "product": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386", "product_id": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-13.el4_7.2?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386", "product": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386", "product_id": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-13.el4_7.2?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386", "product": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386", "product_id": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-13.el4_7.2?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-0:5.1.2-13.el4_7.2.i386", "product": { "name": "net-snmp-0:5.1.2-13.el4_7.2.i386", "product_id": "net-snmp-0:5.1.2-13.el4_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.1.2-13.el4_7.2?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386", "product": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386", "product_id": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-13.el4_7.2?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386", "product": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386", "product_id": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-13.el4_7.2?arch=i386" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386", "product": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386", "product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.2?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386", "product": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386", "product_id": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.2?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386", "product": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386", "product_id": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.2?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386", "product": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386", "product_id": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.2?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386", "product": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386", "product_id": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.2?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-1:5.3.1-24.el5_2.2.i386", "product": { "name": "net-snmp-1:5.3.1-24.el5_2.2.i386", "product_id": "net-snmp-1:5.3.1-24.el5_2.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.2?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64", "product": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64", "product_id": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.25?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64", "product": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64", "product_id": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.25?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-0:5.0.9-2.30E.25.x86_64", "product": { "name": "net-snmp-0:5.0.9-2.30E.25.x86_64", "product_id": "net-snmp-0:5.0.9-2.30E.25.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.25?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64", "product": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64", "product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.25?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64", "product": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64", "product_id": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.25?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64", "product": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64", "product_id": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.25?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64", "product": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64", "product_id": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-13.el4_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64", "product": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64", "product_id": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-13.el4_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-0:5.1.2-13.el4_7.2.x86_64", "product": { "name": "net-snmp-0:5.1.2-13.el4_7.2.x86_64", "product_id": "net-snmp-0:5.1.2-13.el4_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.1.2-13.el4_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64", "product": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64", "product_id": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-13.el4_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64", "product": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64", "product_id": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-13.el4_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64", "product": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64", "product_id": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-13.el4_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64", "product": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64", "product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64", "product": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64", "product_id": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64", "product": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64", "product_id": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64", "product": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64", "product_id": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-1:5.3.1-24.el5_2.2.x86_64", "product": { "name": "net-snmp-1:5.3.1-24.el5_2.2.x86_64", "product_id": "net-snmp-1:5.3.1-24.el5_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64", "product": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64", "product_id": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-0:5.0.9-2.30E.25.src", "product": { "name": "net-snmp-0:5.0.9-2.30E.25.src", "product_id": "net-snmp-0:5.0.9-2.30E.25.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.25?arch=src" } } }, { "category": "product_version", "name": "net-snmp-0:5.1.2-13.el4_7.2.src", "product": { "name": "net-snmp-0:5.1.2-13.el4_7.2.src", "product_id": "net-snmp-0:5.1.2-13.el4_7.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.1.2-13.el4_7.2?arch=src" } } }, { "category": "product_version", "name": "net-snmp-1:5.3.1-24.el5_2.2.src", "product": { "name": "net-snmp-1:5.3.1-24.el5_2.2.src", "product_id": "net-snmp-1:5.3.1-24.el5_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "net-snmp-utils-0:5.0.9-2.30E.25.ppc", "product": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.ppc", "product_id": "net-snmp-utils-0:5.0.9-2.30E.25.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.25?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.0.9-2.30E.25.ppc", "product": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.ppc", "product_id": "net-snmp-devel-0:5.0.9-2.30E.25.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.25?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-0:5.0.9-2.30E.25.ppc", "product": { "name": "net-snmp-0:5.0.9-2.30E.25.ppc", "product_id": "net-snmp-0:5.0.9-2.30E.25.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.25?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc", "product": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc", "product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.25?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.0.9-2.30E.25.ppc", "product": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.ppc", "product_id": "net-snmp-perl-0:5.0.9-2.30E.25.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.25?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc", "product": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc", "product_id": "net-snmp-libs-0:5.0.9-2.30E.25.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.25?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc", "product": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc", "product_id": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-13.el4_7.2?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc", "product": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc", "product_id": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-13.el4_7.2?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-0:5.1.2-13.el4_7.2.ppc", "product": { "name": "net-snmp-0:5.1.2-13.el4_7.2.ppc", "product_id": "net-snmp-0:5.1.2-13.el4_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.1.2-13.el4_7.2?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc", "product": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc", "product_id": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-13.el4_7.2?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc", "product": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc", "product_id": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-13.el4_7.2?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc", "product": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc", "product_id": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-13.el4_7.2?arch=ppc" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc", "product": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc", "product_id": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.2?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc", "product": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc", "product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.2?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc", "product": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc", "product_id": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.2?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc", "product": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc", "product_id": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.2?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-1:5.3.1-24.el5_2.2.ppc", "product": { "name": "net-snmp-1:5.3.1-24.el5_2.2.ppc", "product_id": "net-snmp-1:5.3.1-24.el5_2.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.2?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc", "product": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc", "product_id": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.2?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64", "product": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64", "product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.25?arch=ppc64" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64", "product": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64", "product_id": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.25?arch=ppc64" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64", "product": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64", "product_id": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-13.el4_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64", "product": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64", "product_id": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-13.el4_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64", "product": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64", "product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64", "product": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64", "product_id": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64", "product": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64", "product_id": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.2?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "net-snmp-utils-0:5.0.9-2.30E.25.s390x", "product": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.s390x", "product_id": "net-snmp-utils-0:5.0.9-2.30E.25.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.25?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.0.9-2.30E.25.s390x", "product": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.s390x", "product_id": "net-snmp-devel-0:5.0.9-2.30E.25.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.25?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-0:5.0.9-2.30E.25.s390x", "product": { "name": "net-snmp-0:5.0.9-2.30E.25.s390x", "product_id": "net-snmp-0:5.0.9-2.30E.25.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.25?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x", "product": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x", "product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.25?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.0.9-2.30E.25.s390x", "product": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.s390x", "product_id": "net-snmp-perl-0:5.0.9-2.30E.25.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.25?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.0.9-2.30E.25.s390x", "product": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.s390x", "product_id": "net-snmp-libs-0:5.0.9-2.30E.25.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.25?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x", "product": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x", "product_id": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-13.el4_7.2?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x", "product": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x", "product_id": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-13.el4_7.2?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-0:5.1.2-13.el4_7.2.s390x", "product": { "name": "net-snmp-0:5.1.2-13.el4_7.2.s390x", "product_id": "net-snmp-0:5.1.2-13.el4_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.1.2-13.el4_7.2?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x", "product": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x", "product_id": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-13.el4_7.2?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x", "product": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x", "product_id": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-13.el4_7.2?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x", "product": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x", "product_id": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-13.el4_7.2?arch=s390x" } } }, { "category": "product_version", "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x", "product": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x", "product_id": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.3.1-24.el5_2.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x", "product": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x", "product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x", "product": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x", "product_id": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.3.1-24.el5_2.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x", "product": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x", "product_id": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-1:5.3.1-24.el5_2.2.s390x", "product": { "name": "net-snmp-1:5.3.1-24.el5_2.2.s390x", "product_id": "net-snmp-1:5.3.1-24.el5_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.3.1-24.el5_2.2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x", "product": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x", "product_id": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.2?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390", "product": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390", "product_id": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.0.9-2.30E.25?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.0.9-2.30E.25.s390", "product": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.s390", "product_id": "net-snmp-libs-0:5.0.9-2.30E.25.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.0.9-2.30E.25?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.0.9-2.30E.25.s390", "product": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.s390", "product_id": "net-snmp-utils-0:5.0.9-2.30E.25.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.0.9-2.30E.25?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.0.9-2.30E.25.s390", "product": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.s390", "product_id": "net-snmp-devel-0:5.0.9-2.30E.25.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.0.9-2.30E.25?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-0:5.0.9-2.30E.25.s390", "product": { "name": "net-snmp-0:5.0.9-2.30E.25.s390", "product_id": "net-snmp-0:5.0.9-2.30E.25.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.0.9-2.30E.25?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.0.9-2.30E.25.s390", "product": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.s390", "product_id": "net-snmp-perl-0:5.0.9-2.30E.25.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.0.9-2.30E.25?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390", "product": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390", "product_id": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.1.2-13.el4_7.2?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390", "product": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390", "product_id": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.1.2-13.el4_7.2?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390", "product": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390", "product_id": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-utils@5.1.2-13.el4_7.2?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-0:5.1.2-13.el4_7.2.s390", "product": { "name": "net-snmp-0:5.1.2-13.el4_7.2.s390", "product_id": "net-snmp-0:5.1.2-13.el4_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp@5.1.2-13.el4_7.2?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390", "product": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390", "product_id": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-perl@5.1.2-13.el4_7.2?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390", "product": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390", "product_id": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.1.2-13.el4_7.2?arch=s390" } } }, { "category": "product_version", "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390", "product": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390", "product_id": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-debuginfo@5.3.1-24.el5_2.2?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390", "product": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390", "product_id": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-devel@5.3.1-24.el5_2.2?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390", "product": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390", "product_id": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/net-snmp-libs@5.3.1-24.el5_2.2?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-0:5.0.9-2.30E.25.src" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-devel-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.25.ppc64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-libs-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-perl-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:net-snmp-utils-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.25.src" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ppc64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.ppc as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-0:5.0.9-2.30E.25.src" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-devel-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.25.ppc64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-libs-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-perl-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:net-snmp-utils-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-0:5.0.9-2.30E.25.src" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-devel-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-devel-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.25.ppc64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-libs-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-libs-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-perl-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-perl-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.25.i386" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.25.ia64" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.ppc as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.25.ppc" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.ppc", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.25.s390" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.25.s390x" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:net-snmp-utils-0:5.0.9-2.30E.25.x86_64" }, "product_reference": "net-snmp-utils-0:5.0.9-2.30E.25.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-0:5.1.2-13.el4_7.2.src" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.src" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-0:5.1.2-13.el4_7.2.src" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-0:5.1.2-13.el4_7.2.src" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.i386" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64" }, "product_reference": "net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.src" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.s390" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.s390" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.2.src" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.s390" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.s390" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.2.src" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.s390" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.s390" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.i386" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64" }, "product_reference": "net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-4309", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2008-10-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "469349" } ], "notes": [ { "category": "description", "text": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.", "title": "Vulnerability description" }, { "category": "summary", "text": "net-snmp: numresponses calculation integer overflow in snmp_agent.c", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:net-snmp-0:5.0.9-2.30E.25.i386", "3AS:net-snmp-0:5.0.9-2.30E.25.ia64", "3AS:net-snmp-0:5.0.9-2.30E.25.ppc", "3AS:net-snmp-0:5.0.9-2.30E.25.s390", "3AS:net-snmp-0:5.0.9-2.30E.25.s390x", "3AS:net-snmp-0:5.0.9-2.30E.25.src", "3AS:net-snmp-0:5.0.9-2.30E.25.x86_64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64", "3AS:net-snmp-devel-0:5.0.9-2.30E.25.i386", "3AS:net-snmp-devel-0:5.0.9-2.30E.25.ia64", "3AS:net-snmp-devel-0:5.0.9-2.30E.25.ppc", "3AS:net-snmp-devel-0:5.0.9-2.30E.25.s390", "3AS:net-snmp-devel-0:5.0.9-2.30E.25.s390x", "3AS:net-snmp-devel-0:5.0.9-2.30E.25.x86_64", "3AS:net-snmp-libs-0:5.0.9-2.30E.25.i386", "3AS:net-snmp-libs-0:5.0.9-2.30E.25.ia64", "3AS:net-snmp-libs-0:5.0.9-2.30E.25.ppc", "3AS:net-snmp-libs-0:5.0.9-2.30E.25.ppc64", "3AS:net-snmp-libs-0:5.0.9-2.30E.25.s390", "3AS:net-snmp-libs-0:5.0.9-2.30E.25.s390x", "3AS:net-snmp-libs-0:5.0.9-2.30E.25.x86_64", "3AS:net-snmp-perl-0:5.0.9-2.30E.25.i386", "3AS:net-snmp-perl-0:5.0.9-2.30E.25.ia64", "3AS:net-snmp-perl-0:5.0.9-2.30E.25.ppc", "3AS:net-snmp-perl-0:5.0.9-2.30E.25.s390", "3AS:net-snmp-perl-0:5.0.9-2.30E.25.s390x", "3AS:net-snmp-perl-0:5.0.9-2.30E.25.x86_64", "3AS:net-snmp-utils-0:5.0.9-2.30E.25.i386", "3AS:net-snmp-utils-0:5.0.9-2.30E.25.ia64", "3AS:net-snmp-utils-0:5.0.9-2.30E.25.ppc", "3AS:net-snmp-utils-0:5.0.9-2.30E.25.s390", "3AS:net-snmp-utils-0:5.0.9-2.30E.25.s390x", "3AS:net-snmp-utils-0:5.0.9-2.30E.25.x86_64", "3Desktop:net-snmp-0:5.0.9-2.30E.25.i386", "3Desktop:net-snmp-0:5.0.9-2.30E.25.ia64", "3Desktop:net-snmp-0:5.0.9-2.30E.25.ppc", "3Desktop:net-snmp-0:5.0.9-2.30E.25.s390", "3Desktop:net-snmp-0:5.0.9-2.30E.25.s390x", "3Desktop:net-snmp-0:5.0.9-2.30E.25.src", "3Desktop:net-snmp-0:5.0.9-2.30E.25.x86_64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.i386", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.ia64", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.ppc", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.s390", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.s390x", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.x86_64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.i386", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ia64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ppc", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ppc64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.s390", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.s390x", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.x86_64", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.i386", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.ia64", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.ppc", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.s390", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.s390x", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.x86_64", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.i386", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.ia64", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.ppc", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.s390", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.s390x", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.x86_64", "3ES:net-snmp-0:5.0.9-2.30E.25.i386", "3ES:net-snmp-0:5.0.9-2.30E.25.ia64", "3ES:net-snmp-0:5.0.9-2.30E.25.ppc", "3ES:net-snmp-0:5.0.9-2.30E.25.s390", "3ES:net-snmp-0:5.0.9-2.30E.25.s390x", "3ES:net-snmp-0:5.0.9-2.30E.25.src", "3ES:net-snmp-0:5.0.9-2.30E.25.x86_64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64", "3ES:net-snmp-devel-0:5.0.9-2.30E.25.i386", "3ES:net-snmp-devel-0:5.0.9-2.30E.25.ia64", "3ES:net-snmp-devel-0:5.0.9-2.30E.25.ppc", "3ES:net-snmp-devel-0:5.0.9-2.30E.25.s390", "3ES:net-snmp-devel-0:5.0.9-2.30E.25.s390x", "3ES:net-snmp-devel-0:5.0.9-2.30E.25.x86_64", "3ES:net-snmp-libs-0:5.0.9-2.30E.25.i386", "3ES:net-snmp-libs-0:5.0.9-2.30E.25.ia64", "3ES:net-snmp-libs-0:5.0.9-2.30E.25.ppc", "3ES:net-snmp-libs-0:5.0.9-2.30E.25.ppc64", "3ES:net-snmp-libs-0:5.0.9-2.30E.25.s390", "3ES:net-snmp-libs-0:5.0.9-2.30E.25.s390x", "3ES:net-snmp-libs-0:5.0.9-2.30E.25.x86_64", "3ES:net-snmp-perl-0:5.0.9-2.30E.25.i386", "3ES:net-snmp-perl-0:5.0.9-2.30E.25.ia64", "3ES:net-snmp-perl-0:5.0.9-2.30E.25.ppc", "3ES:net-snmp-perl-0:5.0.9-2.30E.25.s390", "3ES:net-snmp-perl-0:5.0.9-2.30E.25.s390x", "3ES:net-snmp-perl-0:5.0.9-2.30E.25.x86_64", "3ES:net-snmp-utils-0:5.0.9-2.30E.25.i386", "3ES:net-snmp-utils-0:5.0.9-2.30E.25.ia64", "3ES:net-snmp-utils-0:5.0.9-2.30E.25.ppc", "3ES:net-snmp-utils-0:5.0.9-2.30E.25.s390", "3ES:net-snmp-utils-0:5.0.9-2.30E.25.s390x", "3ES:net-snmp-utils-0:5.0.9-2.30E.25.x86_64", "3WS:net-snmp-0:5.0.9-2.30E.25.i386", "3WS:net-snmp-0:5.0.9-2.30E.25.ia64", "3WS:net-snmp-0:5.0.9-2.30E.25.ppc", "3WS:net-snmp-0:5.0.9-2.30E.25.s390", "3WS:net-snmp-0:5.0.9-2.30E.25.s390x", "3WS:net-snmp-0:5.0.9-2.30E.25.src", "3WS:net-snmp-0:5.0.9-2.30E.25.x86_64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64", "3WS:net-snmp-devel-0:5.0.9-2.30E.25.i386", "3WS:net-snmp-devel-0:5.0.9-2.30E.25.ia64", "3WS:net-snmp-devel-0:5.0.9-2.30E.25.ppc", "3WS:net-snmp-devel-0:5.0.9-2.30E.25.s390", "3WS:net-snmp-devel-0:5.0.9-2.30E.25.s390x", "3WS:net-snmp-devel-0:5.0.9-2.30E.25.x86_64", "3WS:net-snmp-libs-0:5.0.9-2.30E.25.i386", "3WS:net-snmp-libs-0:5.0.9-2.30E.25.ia64", "3WS:net-snmp-libs-0:5.0.9-2.30E.25.ppc", "3WS:net-snmp-libs-0:5.0.9-2.30E.25.ppc64", "3WS:net-snmp-libs-0:5.0.9-2.30E.25.s390", "3WS:net-snmp-libs-0:5.0.9-2.30E.25.s390x", "3WS:net-snmp-libs-0:5.0.9-2.30E.25.x86_64", "3WS:net-snmp-perl-0:5.0.9-2.30E.25.i386", "3WS:net-snmp-perl-0:5.0.9-2.30E.25.ia64", "3WS:net-snmp-perl-0:5.0.9-2.30E.25.ppc", "3WS:net-snmp-perl-0:5.0.9-2.30E.25.s390", "3WS:net-snmp-perl-0:5.0.9-2.30E.25.s390x", "3WS:net-snmp-perl-0:5.0.9-2.30E.25.x86_64", "3WS:net-snmp-utils-0:5.0.9-2.30E.25.i386", "3WS:net-snmp-utils-0:5.0.9-2.30E.25.ia64", "3WS:net-snmp-utils-0:5.0.9-2.30E.25.ppc", "3WS:net-snmp-utils-0:5.0.9-2.30E.25.s390", "3WS:net-snmp-utils-0:5.0.9-2.30E.25.s390x", "3WS:net-snmp-utils-0:5.0.9-2.30E.25.x86_64", "4AS:net-snmp-0:5.1.2-13.el4_7.2.i386", "4AS:net-snmp-0:5.1.2-13.el4_7.2.ia64", "4AS:net-snmp-0:5.1.2-13.el4_7.2.ppc", "4AS:net-snmp-0:5.1.2-13.el4_7.2.s390", "4AS:net-snmp-0:5.1.2-13.el4_7.2.s390x", "4AS:net-snmp-0:5.1.2-13.el4_7.2.src", "4AS:net-snmp-0:5.1.2-13.el4_7.2.x86_64", "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386", "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64", "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc", "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64", "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390", "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x", "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64", "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.i386", "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64", "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc", "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390", "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x", "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64", "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.i386", "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64", "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc", "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64", "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390", "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x", "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64", "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.i386", "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64", "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc", "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390", "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x", "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64", "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.i386", "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64", "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc", "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390", "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x", "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64", "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.i386", "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.ia64", "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.ppc", "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.s390", "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.s390x", "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.src", "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.x86_64", "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386", "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64", "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc", "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64", "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390", "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x", "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64", "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.i386", "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64", "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc", "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.s390", "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x", "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64", "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.i386", "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64", "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc", "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64", "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.s390", "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x", "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64", "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.i386", "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64", "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc", "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.s390", "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x", "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64", "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.i386", "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64", "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc", "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.s390", "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x", "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64", "4ES:net-snmp-0:5.1.2-13.el4_7.2.i386", "4ES:net-snmp-0:5.1.2-13.el4_7.2.ia64", "4ES:net-snmp-0:5.1.2-13.el4_7.2.ppc", "4ES:net-snmp-0:5.1.2-13.el4_7.2.s390", "4ES:net-snmp-0:5.1.2-13.el4_7.2.s390x", "4ES:net-snmp-0:5.1.2-13.el4_7.2.src", "4ES:net-snmp-0:5.1.2-13.el4_7.2.x86_64", "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386", "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64", "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc", "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64", "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390", "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x", "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64", "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.i386", "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64", "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc", "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.s390", "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x", "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64", "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.i386", "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64", "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc", "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64", "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.s390", "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x", "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64", "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.i386", "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64", "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc", "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.s390", "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x", "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64", "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.i386", "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64", "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc", "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.s390", "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x", "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64", "4WS:net-snmp-0:5.1.2-13.el4_7.2.i386", "4WS:net-snmp-0:5.1.2-13.el4_7.2.ia64", "4WS:net-snmp-0:5.1.2-13.el4_7.2.ppc", "4WS:net-snmp-0:5.1.2-13.el4_7.2.s390", "4WS:net-snmp-0:5.1.2-13.el4_7.2.s390x", "4WS:net-snmp-0:5.1.2-13.el4_7.2.src", "4WS:net-snmp-0:5.1.2-13.el4_7.2.x86_64", "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386", "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64", "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc", "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64", "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390", "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x", "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64", "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.i386", "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64", "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc", "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390", "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x", "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64", "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.i386", "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64", "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc", "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64", "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390", "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x", "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64", "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.i386", "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64", "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc", "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390", "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x", "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64", "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.i386", "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64", "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc", "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390", "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x", "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.i386", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.ia64", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.ppc", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.s390x", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.src", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.x86_64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.i386", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.s390", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.i386", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.s390", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.i386", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.i386", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64", "5Client:net-snmp-1:5.3.1-24.el5_2.2.i386", "5Client:net-snmp-1:5.3.1-24.el5_2.2.ia64", "5Client:net-snmp-1:5.3.1-24.el5_2.2.ppc", "5Client:net-snmp-1:5.3.1-24.el5_2.2.s390x", "5Client:net-snmp-1:5.3.1-24.el5_2.2.src", "5Client:net-snmp-1:5.3.1-24.el5_2.2.x86_64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.i386", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.s390", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.i386", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.s390", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.i386", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.i386", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64", "5Server:net-snmp-1:5.3.1-24.el5_2.2.i386", "5Server:net-snmp-1:5.3.1-24.el5_2.2.ia64", "5Server:net-snmp-1:5.3.1-24.el5_2.2.ppc", "5Server:net-snmp-1:5.3.1-24.el5_2.2.s390x", "5Server:net-snmp-1:5.3.1-24.el5_2.2.src", "5Server:net-snmp-1:5.3.1-24.el5_2.2.x86_64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.i386", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.s390", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.i386", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.s390", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.i386", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.i386", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-4309" }, { "category": "external", "summary": "RHBZ#469349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=469349" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-4309", "url": "https://www.cve.org/CVERecord?id=CVE-2008-4309" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-4309", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4309" } ], "release_date": "2008-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-11-03T14:53:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "3AS:net-snmp-0:5.0.9-2.30E.25.i386", "3AS:net-snmp-0:5.0.9-2.30E.25.ia64", "3AS:net-snmp-0:5.0.9-2.30E.25.ppc", "3AS:net-snmp-0:5.0.9-2.30E.25.s390", "3AS:net-snmp-0:5.0.9-2.30E.25.s390x", "3AS:net-snmp-0:5.0.9-2.30E.25.src", "3AS:net-snmp-0:5.0.9-2.30E.25.x86_64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x", "3AS:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64", "3AS:net-snmp-devel-0:5.0.9-2.30E.25.i386", "3AS:net-snmp-devel-0:5.0.9-2.30E.25.ia64", "3AS:net-snmp-devel-0:5.0.9-2.30E.25.ppc", "3AS:net-snmp-devel-0:5.0.9-2.30E.25.s390", "3AS:net-snmp-devel-0:5.0.9-2.30E.25.s390x", "3AS:net-snmp-devel-0:5.0.9-2.30E.25.x86_64", "3AS:net-snmp-libs-0:5.0.9-2.30E.25.i386", "3AS:net-snmp-libs-0:5.0.9-2.30E.25.ia64", "3AS:net-snmp-libs-0:5.0.9-2.30E.25.ppc", "3AS:net-snmp-libs-0:5.0.9-2.30E.25.ppc64", "3AS:net-snmp-libs-0:5.0.9-2.30E.25.s390", "3AS:net-snmp-libs-0:5.0.9-2.30E.25.s390x", "3AS:net-snmp-libs-0:5.0.9-2.30E.25.x86_64", "3AS:net-snmp-perl-0:5.0.9-2.30E.25.i386", "3AS:net-snmp-perl-0:5.0.9-2.30E.25.ia64", "3AS:net-snmp-perl-0:5.0.9-2.30E.25.ppc", "3AS:net-snmp-perl-0:5.0.9-2.30E.25.s390", "3AS:net-snmp-perl-0:5.0.9-2.30E.25.s390x", "3AS:net-snmp-perl-0:5.0.9-2.30E.25.x86_64", "3AS:net-snmp-utils-0:5.0.9-2.30E.25.i386", "3AS:net-snmp-utils-0:5.0.9-2.30E.25.ia64", "3AS:net-snmp-utils-0:5.0.9-2.30E.25.ppc", "3AS:net-snmp-utils-0:5.0.9-2.30E.25.s390", "3AS:net-snmp-utils-0:5.0.9-2.30E.25.s390x", "3AS:net-snmp-utils-0:5.0.9-2.30E.25.x86_64", "3Desktop:net-snmp-0:5.0.9-2.30E.25.i386", "3Desktop:net-snmp-0:5.0.9-2.30E.25.ia64", "3Desktop:net-snmp-0:5.0.9-2.30E.25.ppc", "3Desktop:net-snmp-0:5.0.9-2.30E.25.s390", "3Desktop:net-snmp-0:5.0.9-2.30E.25.s390x", "3Desktop:net-snmp-0:5.0.9-2.30E.25.src", "3Desktop:net-snmp-0:5.0.9-2.30E.25.x86_64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x", "3Desktop:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.i386", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.ia64", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.ppc", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.s390", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.s390x", "3Desktop:net-snmp-devel-0:5.0.9-2.30E.25.x86_64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.i386", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ia64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ppc", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.ppc64", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.s390", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.s390x", "3Desktop:net-snmp-libs-0:5.0.9-2.30E.25.x86_64", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.i386", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.ia64", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.ppc", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.s390", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.s390x", "3Desktop:net-snmp-perl-0:5.0.9-2.30E.25.x86_64", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.i386", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.ia64", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.ppc", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.s390", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.s390x", "3Desktop:net-snmp-utils-0:5.0.9-2.30E.25.x86_64", "3ES:net-snmp-0:5.0.9-2.30E.25.i386", "3ES:net-snmp-0:5.0.9-2.30E.25.ia64", "3ES:net-snmp-0:5.0.9-2.30E.25.ppc", "3ES:net-snmp-0:5.0.9-2.30E.25.s390", "3ES:net-snmp-0:5.0.9-2.30E.25.s390x", "3ES:net-snmp-0:5.0.9-2.30E.25.src", "3ES:net-snmp-0:5.0.9-2.30E.25.x86_64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x", "3ES:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64", "3ES:net-snmp-devel-0:5.0.9-2.30E.25.i386", "3ES:net-snmp-devel-0:5.0.9-2.30E.25.ia64", "3ES:net-snmp-devel-0:5.0.9-2.30E.25.ppc", "3ES:net-snmp-devel-0:5.0.9-2.30E.25.s390", "3ES:net-snmp-devel-0:5.0.9-2.30E.25.s390x", "3ES:net-snmp-devel-0:5.0.9-2.30E.25.x86_64", "3ES:net-snmp-libs-0:5.0.9-2.30E.25.i386", "3ES:net-snmp-libs-0:5.0.9-2.30E.25.ia64", "3ES:net-snmp-libs-0:5.0.9-2.30E.25.ppc", "3ES:net-snmp-libs-0:5.0.9-2.30E.25.ppc64", "3ES:net-snmp-libs-0:5.0.9-2.30E.25.s390", "3ES:net-snmp-libs-0:5.0.9-2.30E.25.s390x", "3ES:net-snmp-libs-0:5.0.9-2.30E.25.x86_64", "3ES:net-snmp-perl-0:5.0.9-2.30E.25.i386", "3ES:net-snmp-perl-0:5.0.9-2.30E.25.ia64", "3ES:net-snmp-perl-0:5.0.9-2.30E.25.ppc", "3ES:net-snmp-perl-0:5.0.9-2.30E.25.s390", "3ES:net-snmp-perl-0:5.0.9-2.30E.25.s390x", "3ES:net-snmp-perl-0:5.0.9-2.30E.25.x86_64", "3ES:net-snmp-utils-0:5.0.9-2.30E.25.i386", "3ES:net-snmp-utils-0:5.0.9-2.30E.25.ia64", "3ES:net-snmp-utils-0:5.0.9-2.30E.25.ppc", "3ES:net-snmp-utils-0:5.0.9-2.30E.25.s390", "3ES:net-snmp-utils-0:5.0.9-2.30E.25.s390x", "3ES:net-snmp-utils-0:5.0.9-2.30E.25.x86_64", "3WS:net-snmp-0:5.0.9-2.30E.25.i386", "3WS:net-snmp-0:5.0.9-2.30E.25.ia64", "3WS:net-snmp-0:5.0.9-2.30E.25.ppc", "3WS:net-snmp-0:5.0.9-2.30E.25.s390", "3WS:net-snmp-0:5.0.9-2.30E.25.s390x", "3WS:net-snmp-0:5.0.9-2.30E.25.src", "3WS:net-snmp-0:5.0.9-2.30E.25.x86_64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.i386", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ia64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.ppc64", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.s390x", "3WS:net-snmp-debuginfo-0:5.0.9-2.30E.25.x86_64", "3WS:net-snmp-devel-0:5.0.9-2.30E.25.i386", "3WS:net-snmp-devel-0:5.0.9-2.30E.25.ia64", "3WS:net-snmp-devel-0:5.0.9-2.30E.25.ppc", "3WS:net-snmp-devel-0:5.0.9-2.30E.25.s390", "3WS:net-snmp-devel-0:5.0.9-2.30E.25.s390x", "3WS:net-snmp-devel-0:5.0.9-2.30E.25.x86_64", "3WS:net-snmp-libs-0:5.0.9-2.30E.25.i386", "3WS:net-snmp-libs-0:5.0.9-2.30E.25.ia64", "3WS:net-snmp-libs-0:5.0.9-2.30E.25.ppc", "3WS:net-snmp-libs-0:5.0.9-2.30E.25.ppc64", "3WS:net-snmp-libs-0:5.0.9-2.30E.25.s390", "3WS:net-snmp-libs-0:5.0.9-2.30E.25.s390x", "3WS:net-snmp-libs-0:5.0.9-2.30E.25.x86_64", "3WS:net-snmp-perl-0:5.0.9-2.30E.25.i386", "3WS:net-snmp-perl-0:5.0.9-2.30E.25.ia64", "3WS:net-snmp-perl-0:5.0.9-2.30E.25.ppc", "3WS:net-snmp-perl-0:5.0.9-2.30E.25.s390", "3WS:net-snmp-perl-0:5.0.9-2.30E.25.s390x", "3WS:net-snmp-perl-0:5.0.9-2.30E.25.x86_64", "3WS:net-snmp-utils-0:5.0.9-2.30E.25.i386", "3WS:net-snmp-utils-0:5.0.9-2.30E.25.ia64", "3WS:net-snmp-utils-0:5.0.9-2.30E.25.ppc", "3WS:net-snmp-utils-0:5.0.9-2.30E.25.s390", "3WS:net-snmp-utils-0:5.0.9-2.30E.25.s390x", "3WS:net-snmp-utils-0:5.0.9-2.30E.25.x86_64", "4AS:net-snmp-0:5.1.2-13.el4_7.2.i386", "4AS:net-snmp-0:5.1.2-13.el4_7.2.ia64", "4AS:net-snmp-0:5.1.2-13.el4_7.2.ppc", "4AS:net-snmp-0:5.1.2-13.el4_7.2.s390", "4AS:net-snmp-0:5.1.2-13.el4_7.2.s390x", "4AS:net-snmp-0:5.1.2-13.el4_7.2.src", "4AS:net-snmp-0:5.1.2-13.el4_7.2.x86_64", "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386", "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64", "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc", "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64", "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390", "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x", "4AS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64", "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.i386", "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64", "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc", "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390", "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x", "4AS:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64", "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.i386", "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64", "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc", "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64", "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390", "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x", "4AS:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64", "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.i386", "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64", "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc", "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390", "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x", "4AS:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64", "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.i386", "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64", "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc", "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390", "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x", "4AS:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64", "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.i386", "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.ia64", "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.ppc", "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.s390", "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.s390x", "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.src", "4Desktop:net-snmp-0:5.1.2-13.el4_7.2.x86_64", "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386", "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64", "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc", "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64", "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390", "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x", "4Desktop:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64", "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.i386", "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64", "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc", "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.s390", "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x", "4Desktop:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64", "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.i386", "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64", "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc", "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64", "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.s390", "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x", "4Desktop:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64", "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.i386", "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64", "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc", "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.s390", "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x", "4Desktop:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64", "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.i386", "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64", "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc", "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.s390", "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x", "4Desktop:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64", "4ES:net-snmp-0:5.1.2-13.el4_7.2.i386", "4ES:net-snmp-0:5.1.2-13.el4_7.2.ia64", "4ES:net-snmp-0:5.1.2-13.el4_7.2.ppc", "4ES:net-snmp-0:5.1.2-13.el4_7.2.s390", "4ES:net-snmp-0:5.1.2-13.el4_7.2.s390x", "4ES:net-snmp-0:5.1.2-13.el4_7.2.src", "4ES:net-snmp-0:5.1.2-13.el4_7.2.x86_64", "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386", "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64", "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc", "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64", "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390", "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x", "4ES:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64", "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.i386", "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64", "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc", "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.s390", "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x", "4ES:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64", "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.i386", "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64", "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc", "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64", "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.s390", "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x", "4ES:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64", "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.i386", "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64", "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc", "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.s390", "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x", "4ES:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64", "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.i386", "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64", "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc", "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.s390", "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x", "4ES:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64", "4WS:net-snmp-0:5.1.2-13.el4_7.2.i386", "4WS:net-snmp-0:5.1.2-13.el4_7.2.ia64", "4WS:net-snmp-0:5.1.2-13.el4_7.2.ppc", "4WS:net-snmp-0:5.1.2-13.el4_7.2.s390", "4WS:net-snmp-0:5.1.2-13.el4_7.2.s390x", "4WS:net-snmp-0:5.1.2-13.el4_7.2.src", "4WS:net-snmp-0:5.1.2-13.el4_7.2.x86_64", "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.i386", "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ia64", "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc", "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.ppc64", "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390", "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.s390x", "4WS:net-snmp-debuginfo-0:5.1.2-13.el4_7.2.x86_64", "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.i386", "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.ia64", "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.ppc", "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390", "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.s390x", "4WS:net-snmp-devel-0:5.1.2-13.el4_7.2.x86_64", "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.i386", "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ia64", "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc", "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.ppc64", "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390", "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.s390x", "4WS:net-snmp-libs-0:5.1.2-13.el4_7.2.x86_64", "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.i386", "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.ia64", "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.ppc", "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390", "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.s390x", "4WS:net-snmp-perl-0:5.1.2-13.el4_7.2.x86_64", "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.i386", "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.ia64", "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.ppc", "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390", "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.s390x", "4WS:net-snmp-utils-0:5.1.2-13.el4_7.2.x86_64", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.i386", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.ia64", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.ppc", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.s390x", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.src", "5Client-Workstation:net-snmp-1:5.3.1-24.el5_2.2.x86_64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x", "5Client-Workstation:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.i386", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.s390", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x", "5Client-Workstation:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.i386", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.s390", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x", "5Client-Workstation:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.i386", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x", "5Client-Workstation:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.i386", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x", "5Client-Workstation:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64", "5Client:net-snmp-1:5.3.1-24.el5_2.2.i386", "5Client:net-snmp-1:5.3.1-24.el5_2.2.ia64", "5Client:net-snmp-1:5.3.1-24.el5_2.2.ppc", "5Client:net-snmp-1:5.3.1-24.el5_2.2.s390x", "5Client:net-snmp-1:5.3.1-24.el5_2.2.src", "5Client:net-snmp-1:5.3.1-24.el5_2.2.x86_64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x", "5Client:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.i386", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.s390", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x", "5Client:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.i386", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.s390", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x", "5Client:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.i386", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x", "5Client:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.i386", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x", "5Client:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64", "5Server:net-snmp-1:5.3.1-24.el5_2.2.i386", "5Server:net-snmp-1:5.3.1-24.el5_2.2.ia64", "5Server:net-snmp-1:5.3.1-24.el5_2.2.ppc", "5Server:net-snmp-1:5.3.1-24.el5_2.2.s390x", "5Server:net-snmp-1:5.3.1-24.el5_2.2.src", "5Server:net-snmp-1:5.3.1-24.el5_2.2.x86_64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.i386", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ia64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.ppc64", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.s390x", "5Server:net-snmp-debuginfo-1:5.3.1-24.el5_2.2.x86_64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.i386", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ia64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.ppc64", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.s390", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.s390x", "5Server:net-snmp-devel-1:5.3.1-24.el5_2.2.x86_64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.i386", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ia64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.ppc64", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.s390", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.s390x", "5Server:net-snmp-libs-1:5.3.1-24.el5_2.2.x86_64", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.i386", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.ia64", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.ppc", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.s390x", "5Server:net-snmp-perl-1:5.3.1-24.el5_2.2.x86_64", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.i386", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.ia64", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.ppc", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.s390x", "5Server:net-snmp-utils-1:5.3.1-24.el5_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0971" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "net-snmp: numresponses calculation integer overflow in snmp_agent.c" } ] }
ghsa-c4mx-98gv-gxm8
Vulnerability from github
Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.
{ "affected": [], "aliases": [ "CVE-2008-4309" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-10-31T20:29:00Z", "severity": "MODERATE" }, "details": "Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.", "id": "GHSA-c4mx-98gv-gxm8", "modified": "2022-05-02T00:08:51Z", "published": "2022-05-02T00:08:51Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4309" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2008:0971" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2008-4309" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=469349" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46262" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6171" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6353" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9860" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=125017764422557\u0026w=2" }, { "type": "WEB", "url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271\u0026r2=17272\u0026pathrev=17272" }, { "type": "WEB", "url": "http://secunia.com/advisories/32539" }, { "type": "WEB", "url": "http://secunia.com/advisories/32560" }, { "type": "WEB", "url": "http://secunia.com/advisories/32664" }, { "type": "WEB", "url": "http://secunia.com/advisories/32711" }, { "type": "WEB", "url": "http://secunia.com/advisories/33003" }, { "type": "WEB", "url": "http://secunia.com/advisories/33095" }, { "type": "WEB", "url": "http://secunia.com/advisories/33631" }, { "type": "WEB", "url": "http://secunia.com/advisories/33746" }, { "type": "WEB", "url": "http://secunia.com/advisories/33821" }, { "type": "WEB", "url": "http://secunia.com/advisories/35074" }, { "type": "WEB", "url": "http://secunia.com/advisories/35679" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200901-15.xml" }, { "type": "WEB", "url": "http://sourceforge.net/forum/forum.php?forum_id=882903" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3549" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT4298" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm" }, { "type": "WEB", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315" }, { "type": "WEB", "url": "http://www.debian.org/security/2008/dsa-1663" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:225" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2008/10/31/1" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0971.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/498280/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/32020" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1021129" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0001.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/2973" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/3400" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/0301" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1771" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.